Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Oracle Exam 1Z0-1067-23 Topic 5 Question 38 Discussion

Actual exam question for Oracle's 1Z0-1067-23 exam
Question #: 38
Topic #: 5
[All 1Z0-1067-23 Questions]

Your deployment platform within Oracle Cloud Infrastructure (OCI) leverages a compute instance with multiple block volumes attached. There are multiple teams that use the same compute instance and have access to these block volumes. You want to ensure that no one accidentally deletes any of these block volumes. You have started to construct the following IAM policy but need to determine which permissions should be used. allow group DeploymentUsers to manage volume-family where ANY { request.permission != , request.permission != , request.permission != } Which permissions can you use in place of in this policy? (Choose the best answer.)

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Carol
13 days ago
This Terraform code is making me thirsty. I could go for a nice cold Object Storage bucket right about now.
upvoted 0 times
...
Mirta
15 days ago
Are you sure? I think it's creating a lifecycle policy to move data to Archival storage. Option D looks like the right pick to me.
upvoted 0 times
...
Glennis
16 days ago
Nah, man, this is creating a URL to manage the objects in the bucket. Option C is the way to go.
upvoted 0 times
...
Lea
18 days ago
I agree with Julianna, creating a URL for managing objects makes more sense in this context.
upvoted 0 times
...
Carlee
21 days ago
Ah, I see what's going on now. This is providing read and write access to the objects in the bucket. Option B is the correct choice.
upvoted 0 times
...
Julianna
25 days ago
That's a good point, but I think it actually creates a URL to provide access to the bucket for managing objects.
upvoted 0 times
...
Vivan
1 months ago
The code looks like it's creating a pre-authenticated request for object access in an OCI Object Storage bucket. Option A seems to be the best answer here.
upvoted 0 times
Becky
10 days ago
C) VOLUME_DELETE, VOLUME_ATTACHMENT_DELETE, VOLUME_BACKUP_DELETE
upvoted 0 times
...
Hana
15 days ago
A) DELETE_VOLUME, DELETE_VOLUME_ATTACHMENT, DE-LETE_VOLUME_BACKUP
upvoted 0 times
...
Edison
21 days ago
I agree, those permissions would prevent accidental deletion of the block volumes.
upvoted 0 times
...
Annette
23 days ago
A) DELETE_VOLUME, DELETE_VOLUME_ATTACHMENT, DELETE_VOLUME_BACKUP
upvoted 0 times
...
...
Kate
1 months ago
I believe it provides object read and write access for an OCI Object Storage bucket.
upvoted 0 times
...
Julianna
1 months ago
I think the code snippet creates a pre-authenticated request for objects in an OCI Object Storage bucket.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77