Which four steps do you perform next?

You have created two instances, A and B. You need to allow traffic between both instances. Instance A shouldbe open for traffic from the public internet over HTTP and HTTPS, and Instance B should only allow HTTP and
HTTPS traffic from a specific set of IP addresses. You have already created the security IP list with the
specified set of IP addresses.
Which four steps do you perform next?

You have created two instances, A and B. You need to allow traffic between both instances. Instance A shouldbe open for traffic from the public internet over HTTP and HTTPS, and Instance B should only allow HTTP and
HTTPS traffic from a specific set of IP addresses. You have already created the security IP list with the
specified set of IP addresses.
Which four steps do you perform next?

A.
Create security rules to enable traffic from the public internet list to Security List 3 over HTTP and HTTPS.

B.
Create security rules to enable traffic from the security IP list to Security List 1 over HTTP and HTTPS.

C.
Create security rules to enable traffic from the public internet list to Security List 1 over HTTP and HTTPS.

D.
Add instance A to another security list, say Security List 2.

E.
Add instance A and instance B to the same security list, say Security List 1.

F.
Add instance B to another security list, say Security List 3.

G.
Enable security rules to enable traffic from the public internet to Security List 2 over HTTP and HTTPS.



Leave a Reply 8

Your email address will not be published. Required fields are marked *


From Experts

From Experts

C, E, F and G

narender

narender

Security List 2 -> Please confirm which instance is added to security list 2.

arunj

arunj

I also think BDEG, but have below question (considering BDEG).
In BDEG case, instance A will be in two Security List (Security List 1 and Security List 2). Per below Doc

https://docs.oracle.com/cloud/latest/computecs_common/OCSUG/GUID-89E0C5E6-0E26-4CE2-A348-9A109C46B553.htm#OCSUG230

“An instance can be added to multiple security lists. In case of conflicts in policy, the most restrictive policy takes precedence”

For Instance A below are the two policies?
1. Security List 1 -> Enable traffic from the security IP list to Security List1 over HTTP and HTTPS. (as per option B)
2. Security List 2 ->Enable security rules to enable traffic from the public internet to Security List 2 over HTTP and HTTPS (per option G)

So wouldn’t the restrictive one i.e ONLY Traffic from Security IP List will be applicable to instance A?

Any inputs?

arunj

arunj

Just wondering if answer is A, C, E ,F?
In the option A it says “a) Create security rules to enable traffic from the public internet list to Security List 3 over HTTP and HTTPS.”

Not sure what they mean by “public internet list”? Is it same as “public internet”?

Mac

Mac

BDFG

Mac

Mac

BDEG should be correct.