which two tasks could you perform to validate that it i…

After successfully creating an Oracle Linux instance, which two tasks could you perform to validate that it is
working?

After successfully creating an Oracle Linux instance, which two tasks could you perform to validate that it is
working?

A.
Ping the instance from an external host by using the public IP address of the instance.

B.
Ping the instance from an instance in another security list in the same domain, using the private IP address
of the instance.

C.
Log in to the instance with its public IP address from an external host by using SSH.

D.
Log in to the instance with its private IP address from an instance in the same security list by using SSH.



Leave a Reply 5

Your email address will not be published. Required fields are marked *


Turgun

Turgun

Answer C D
We cannot validate an instance by ‘PING’ request. We need to login using SSH.

When you create Oracle Compute Cloud Service instances, ping requests to the instances are not permitted by default. To allow ping requests, you must configure your Oracle Compute Cloud Service instance to permit pings.
http://www.oracle.com/webfolder/technetwork/tutorials/obe/cloud/compute-iaas/permitting_ping_requests_to_compute_instances/permitting_ping_requests_to_compute_instances.html

reachmaheswar

reachmaheswar

you are right

yaozg

yaozg

C,D
B is wrong.
https://docs.oracle.com/en/cloud/iaas/compute-iaas-cloud/stcsg/networking-problems.html#GUID-57BBE68C-978B-4343-A05B-4D474667EBB2

Description

I’ve created multiple instances, but am unable to configure them to communicate with each other.

Solution

By default, instances can communicate with each other only if they’re part of the same security list. If your instances aren’t part of the same security list, then you can add them to a security list, as described in Adding an Instance to a Security List. Alternatively, if you want to keep your instances in separate security lists, then you can define security rules that enable all instances in a specified security list to communicate with all instances in another security list. See Managing Security Rules.