A. 1.5 GB
B. 2.5 GB
C. 1 GB
D. 0.5 GB
A. The identity domain automatically replicates to the other region.
B. Identity domain replication must be enabled.
C. Users can access resources in all regions by default.
D. The administrator can grant users permissions to access specific resources in the other region.
A. Policies should be written in a complex and technical manner to enhance security.
B. Policies should be identical for all users within a tenancy.
C. Policies should provide only the minimum set of permissions required for users to perform their tasks effectively.
D. Policies should grant all possible permissions to simplify access control.
A. You can only delete an instance configuration if it is not associated with any instance pool.
B. You can delete an instance configuration if it is associated with an instance pool.
C. An instance pool can have multiple instance configurations associated with it.
D. You cannot reuse the same instance configuration for multiple instance pools.
A. Two VCNs with nonoverlapping CIDRS in the same region, a dynamic routing gateway (DRG) attached to each VCN, and a direct connection between the DRGs.
B. A single VCN with nonoverlapping CIDRS in each region, a dynamic routing gateway (DRG) attached to each VCN, and a direct connection between the DRGS.
C. Two VCNs with overlapping CIDRS in different regions, a virtual private network (VPN) gateway attached to each VCN, and a direct connection between the VPN gateways.
D. Two VCNs with nonoverlapping CIDRS in different regions, a dynamic routing gateway (DRG) attached to each VCN, a remote peering connection (RPC) on each DRG, and a connection established between the RPCs.