A. Resource group
B. Trigger rule
C. Statistic
D. Suppression
A. Human interaction challenge
B. CAPTCHA challenge
C. JavaScript challenge
D. Device fingerprint challenge
A. Policies
B. Dynamic groups
C. Groups
D. Users
A. Compartments
B. Web Application Firewall (WAF)
C. Vault
D. Data Guard
A. Distributed Denial of Service (DDoS)
B. Ports that are unintentionally left open can be a potential attack vector for cloud resources
C. SQL Injection
D. CIS published Industry-standard benchmarks
A. ACCOUNT ACCESS MANAGEMENT
B. PROVIDING STRONG SECURITY LIST
C. Strong IAM Framework
D. Strong Isolation
E. MAINTAINING CUSTOMER DATA
A. URL_IS
B. URL_STARTS_WITH
C. URL_PART_CONTAINS
D. URL_PART_ENDS_WITH
A. Allow group group-uat1 group-uat2 to manage all resources in compartment Uat
B. Allow any-user to manage all resources in tenancy where target.compartment= Uat
C. Allow any-user to manage all resources in compartment Uat where request.group=/group-uat/*
D. Allow group /group-uat*/ to manage all resources in compartment Uat
A. 194.168.0.0/24 and 194.168.0.0/16
B. 12.0.0.0/16 and 12.0.0.0/16C 194.168.0.0/24 and 194.168.0.0/24
C. 12.0.0.0/16 and 194.168.0.0/16
A. Ensure that functions in a VCN have restricted access to resources and services.
B. Add applications to network security groups for fine-grained ingress/egress rules.
C. Grant privileges to UID and GID 1000, such that the functions running within a container acquire the default root capabilities.
D. Define a policy statement that enables access to functions for requests coming from multiple IP addresses.