|
Format: Multiple Choice
Duration: 90 Minutes
Number of Questions: 50
Passing Score: 68%
Validation: This exam has been validated against Oracle Cloud Infrastructure
2025
Policy: Cloud Recertification
Earn associated certifications
Passing this exam is required to earn these certifications. Select each
certification title below to view full requirements.
Oracle Cloud Infrastructure 2025 Certified Networking Professional
Prepare to pass exam: 1Z0-1124-25
Oracle Cloud Infrastructure 2025 Certified Networking Professional
certification is for Cloud professionals that have at least two years of general
experience with OCI, or other IaaS cloud providers and are already familiar with
general Networking concepts. An Oracle Cloud Infrastructure 2025 Certified
Networking Professional has demonstrated the hands-on experience and knowledge
required to plan, design, implement, and operate networking solutions on OCI.
The abilities validated by this certification include:
• Plan and Design OCI Networking and Connectivity Solutions
• Design for Hybrid and Multicloud Networking Architectures
• Implement and Operate Secure OCI Networking and Connectivity Solutions
• Migrate Workloads to OCI
• Troubleshoot OCI Networking and Connectivity Issues
Up-to-date training and field experience are recommended, two years of hands-on
experience is highly advisable before taking this test. Candidates have
preferably already earned the OCI Architect Associate certification, or
equivalent with other cloud service providers.
Take recommended training
Complete one of the courses below to prepare for your exam (optional):
Become An Oracle Cloud Infrastructure Networking Professional (2025)
Additional Preparation and Information
A combination of Oracle training and hands-on experience (attained via labs
and/or field experience), in the learning subscription, provides the best
preparation for passing the exam.
Review exam topics
Design and Deploy OCI Virtual Cloud Networks (VCN) 10%
Plan and Design OCI Networking Solutions and App Services 20%
Design for Hybrid Networking Architectures 20%
Transitive Routing 10%
Implement and Operate Secure OCI Networking and Connectivity Solutions 20%
Migrate Workloads to OCI 10%
Troubleshoot OCI Networking and Connectivity Issues 10%
Design and Deploy OCI Virtual Cloud Networks (VCN)
Examine VCN/Subnets characteristics
Demonstrate an understanding of IPv4/IPv6 addressing
Differentiate the VCN Gateway's roles
Recognize the different Endpoints
Demonstrate mastery in applying EndPoints to a Networking Architecture
Object Storage End Points (Place Keeper)
Plan and Design OCI Networking Solutions and App Services
Recognize IP Management details, select procedural steps
Demonstrate an understanding of OCI load-balancing offerings and related
resources
Demonstrate knowledge of OCI DNS and Traffic Steering
DNSsec (Place Keeper)
Design for Hybrid Networking Architectures
Demonstrate command of DRG and DRG Attachments
Assess knowledge of BGP
Evaluate OCI VPN Services
Validate knowhow of the different FastConnect products from OCI
Sustain multi-cloud connectivity configurations
IPSec over FastConnect
Transitive Routing
Interpret key aspects of transitive routing with DRG, LPG, and Network
Appliance resources
Synthesize Transitive Routing Configurations
Implement and Operate Secure OCI Networking and Connectivity Solutions
Apply Connectivity and related IAM concepts to inter-tenancy communications
Show different approaches for Bastion service in multi-tier architectures
Demonstrate CloudShell functionalities
Illustrate Network Firewall characteristics
Evaluate WAF/Edge/Certificates/services in a Networking multi-tier architecture
OBSOLETE= Interpret IaC/OKE services in a Networking multi-tier architecture
Zero Trust Packet Routing
Migrate Workloads to OCI
Outline optimal connectivity strategy for a cloud migration from On-Premises
Outline optimal connectivity strategy for a cloud migration from another Cloud
Service Provider
Outline optimal multicloud scenarios
Troubleshoot OCI Networking and Connectivity Issues
Select the right products for various troubleshooting and design scenarios
Demonstrate logging expertise in OCI
OCI Networking Best Practices
Demonstrate knowledge of Networking Architecture Design best practices
Demonstrate knowledge of Networking Security best practices
Demonstrate knowledge of Networking Connectivity best practices
Demonstrate knowledge of Logging and Monitoring best practices
1Z0-1124-25 Brain Dumps Exam + Online / Offline and Android Testing Engine & 4500+ other exams included
$50 - $25 (you save $25)
Buy Now
QUESTION 1
You are troubleshooting a connectivity issue between two compute instances
within the same VCN.
Both instances are in different subnets. Instance A (IPv4: 10.0.1.10, IPv6:
fc00:1:1::10) can ping its
subnet gateway (10.0.1.1) and can ping the IPv6 address of Instance B
(fc00:1:2::20), but cannot ping
Instance B's IPv4 address (10.0.2.20). The security lists and network security
groups (NSGs) are
configured to allow all traffic between the subnets. The route table for
Instance As subnet has a rule
to route all traffic destined to 10.0.2.0 subnet to the VCN Local Peering
Gateway. What is the
most probable cause?
A. The VCN does not have IPv6 enabled.
B. The route table for Instance B's subnet is missing a rule to route traffic
destined for 10.0.1.0 to the VCN Local Peering Gateway.
C. IPv6 traffic cannot be filtered by security lists or NSGs.
D. The "ping" utility is not supported on the IPv6 address.
Answer: B
Explanation:
Analyze Connectivity Successes: Instance A can ping its subnet gateway
(10.0.1.1), indicating that
local subnet routing and security rules are functioning for IPv4. It can also
ping Instance Bs IPv6
address (fc00:1:2::20), confirming that IPv6 routing and security rules between
subnets are operational.
Identify the Failure: Instance A cannot ping Instance Bs IPv4 address
(10.0.2.20). Since security lists
and NSGs allow all traffic, the issue is unlikely to be a security configuration
problem.
Examine Routing for Instance A: The route table for Instance As subnet
(10.0.1.0) has a rule
directing traffic to 10.0.2.0 via the VCN Local Peering Gateway (LPG). In OCI,
LPGs are used for
intra-region VCN peering, but here, both instances are in the same VCN, so this
rule is likely a
misconfiguration or irrelevant unless peering is involved. However, the
successful IPv6 ping suggests
basic connectivity exists.
Check Return Path from Instance B: For a ping to succeed, Instance B must send
ICMP replies back to
Instance A (10.0.1.10). Instance Bs subnet (10.0.2.0) needs a route table entry
to send traffic to
10.0.1.0. Without this, replies are dropped, causing the IPv4 ping to fail. The
IPv6 success
indicates that IPv6 routing is correctly configured both ways, possibly via
SLAAC or default routes.
Evaluate Options:
A: Incorrect. IPv6 is enabled, as Instance A pings Instance Bs IPv6 address.
B: Correct. Missing route for 10.0.1.0 in Instance Bs subnet prevents IPv4
replies.
C: Incorrect. Security lists and NSGs can filter IPv6 traffic in OCI.
D: Incorrect. Ping supports IPv6, as evidenced by the successful IPv6 ping.
The most probable cause is a missing route in Instance Bs subnet route table. In
OCI, each subnet
has its own route table, and for instances in different subnets within the same
VCN to communicate,
both subnets must have appropriate routes. The successful IPv6 ping suggests
that IPv6 routing is
intact (likely due to default behavior or SLAAC), but IPv4 requires explicit
routing. Per the Oracle
Networking Professional study guide, "Route tables must be configured to direct
traffic to the
appropriate next hop for inter-subnet communication within a VCN" (OCI
Networking
Documentation, Section: Virtual Cloud Networks).
Reference: Oracle Cloud Infrastructure Documentation - Networking Overview,
Route Tables.
QUESTION 2
You are designing a backup solution in OCI. Compute instances in a private
subnet need to back up
data to OCI Object Storage. Security policy mandates that data transfer must not
traverse the public internet.
You need to choose the most secure and cost-effective method for accessing
Object Storage.
Which endpoint/gateway configuration should you implement?
A. Configure an Internet Gateway and use public Object Storage endpoints.
B. Configure a NAT Gateway and use public Object Storage endpoints with HTTPS
enabled.
C. Configure a Service Gateway with the Oracle Services Network service CIDR
label for your region, and use regional Object Storage endpoints.
D. Configure a Dynamic Routing Gateway (DRG) and FastConnect to a remote region
and use public Object Storage endpoints.
Answer: C
Explanation:
Requirement Analysis: The solution must ensure private access to Object Storage
without public
internet traversal, while being cost-effective.
Evaluate OCI Components:
Internet Gateway: Provides public internet access, unsuitable for private
connectivity.
NAT Gateway: Allows outbound internet access from private subnets, but traffic
still exits OCI.
Service Gateway: Enables private access to OCI services like Object Storage
within the same region.
DRG with FastConnect: Used for on-premises connectivity, not intra-OCI service
access.
Option Assessment:
A: Uses public internet, violating the security policy.
B: HTTPS encrypts data, but traffic traverses the internet via NAT, violating
the policy.
C: Service Gateway keeps traffic within OCIs private network, meeting security
and cost goals.
D: Overly complex and costly, with public endpoints contradicting the
requirement.
Conclusion: Service Gateway with regional Object Storage endpoints ensures
private, secure, and
cost-effective access.
The Service Gateway is designed for private access to OCI services like Object
Storage, avoiding the
public internet. The Oracle Networking Professional study guide states, "A
Service Gateway allows
instances in a private subnet to access supported OCI services without an
Internet Gateway or NAT
Gateway, ensuring traffic remains within the Oracle network" (OCI Networking
Documentation,
Section: Service Gateway). Using the Oracle Services Network service CIDR label
for the region
ensures compatibility with Object Storage endpoints, optimizing cost and
security.
Reference: Oracle Cloud Infrastructure Documentation - Service Gateway.
QUESTION 3
Your company has established a hybrid cloud environment using FastConnect to
connect your onpremises
network to your OCI VCN. You are advertising on-premises network prefixes to OCI
via BGP.
You want to ensure that OCI only learns routes from your on-premises network
that are within a
specific range, and that any other prefixes advertised are rejected to prevent
routing conflicts.
Which BGP attribute and configuration on the OCI side should you use to achieve
this?
A. AS Path Prepending: Configure AS Path Prepending on the FastConnect virtual
circuit to discourage OCI from selecting routes outside the desired range.
B. MED (Multi-Exit Discriminator): Configure MED values on the on-premises BGP
router to influence OCI's route selection based on preferred exit points.
C. Route Filtering using Route Distinguisher (RD) and Route Target (RT):
Configure RDs and RTs on the FastConnect virtual circuit to filter routes based
on tenant isolation.
D. Route Filtering using Prefix Lists: Configure Prefix Lists on the FastConnect
virtual circuit to accept only the desired prefix ranges and reject all others.
Answer: D
Explanation:
Objective: Filter BGP routes on OCI to accept only specific on-premises
prefixes.
BGP Attributes Overview:
AS Path Prepending: Lengthens AS path to influence route preference, not
filtering.
MED: Influences exit point selection, not route acceptance.
RD/RT: Used in MPLS VPNs for tenant isolation, not simple prefix filtering.
Prefix Lists: Directly filter prefixes based on IP ranges.
Evaluate Options:
A: AS Path Prepending affects preference, not filtering; unsuitable.
B: MED influences path selection, not route rejection; incorrect.
C: RD/RT is for VPN contexts, not applicable here.
D: Prefix Lists explicitly allow/deny prefixes, meeting the requirement.
Conclusion: Prefix Lists on the FastConnect virtual circuit provide precise
control over accepted routes.
Prefix Lists are the most effective BGP tool for filtering routes in OCI. The
Oracle Networking
Professional study guide notes, "Prefix Lists can be applied to FastConnect
virtual circuits to filter BGP
advertisements, ensuring only approved prefixes are learned by OCI" (OCI
Networking
Documentation, Section: FastConnect and BGP). This prevents routing conflicts by
rejecting
unwanted prefixes, aligning with the security and control requirements.
Reference: Oracle Cloud Infrastructure Documentation - FastConnect, BGP
Configuration.
QUESTION 4
Which OCI service or feature enables the enforcement of granular, identity-based
access controls for packet routing, crucial for implementing Zero Trust
principles?
A. Internet Gateway
B. Service Gateway
C. Network Security Groups (NSGs)
D. Dynamic Routing Gateway (DRG)
Answer: C
Explanation:
Zero Trust Principles: Require explicit, identity-based access controls at every
network stage.
Evaluate OCI Services:
Internet Gateway: Enables public internet access, no identity-based control.
Service Gateway: Provides private service access, no granular routing control.
NSGs: Offer stateful, identity-based rules at the VNIC level.
DRG: Facilitates routing, not identity-based access control.
NSG Fit: NSGs allow rules based on VNIC identity, source/destination IP, and
ports, aligning with Zero Trust.
Conclusion: NSGs are the best fit for granular, identity-based routing control.
NSGs are pivotal for Zero Trust in OCI. The Oracle Networking Professional study
guide states,
"Network Security Groups provide granular, stateful security rules that can be
applied to specific
VNICs, enabling identity-based access controls essential for Zero Trust
architectures" (OCI
Networking Documentation, Section: Network Security Groups). Unlike security
lists (subnet-level),
NSGs offer instance-level precision.
Reference: Oracle Cloud Infrastructure Documentation - Network Security Groups.
QUESTION 5
You are using Terraform to deploy a multi-tier application architecture
consisting of a public subnet
hosting a load balancer, a private subnet hosting application servers, and
another private subnet hosting a database.
The Terraform code successfully creates all the required infrastructure,
including route tables and security lists.
However, after deployment, you realize that the load balancer cannot reach the
application servers in the private subnet.
You have verified that the load balancer is healthy and the application servers
are running.
What is the most likely cause of this connectivity problem?
A. The security list associated with the application server subnet does not
allow ingress traffic from the load balancer's IP address range.
B. The route table associated with the application server subnet has a default
route pointing to the Internet Gateway, which is incorrect for a private subnet.
C. The Network Address Translation (NAT) Gateway is misconfigured, preventing
the application servers from initiating connections back to the load balancer.
D. The load balancer's security list is not configured to allow egress traffic
to the application server subnet on the required ports (e.g., port 8080).
Answer: A
Explanation:
Problem Scope: Load balancer (public subnet) cannot reach application servers
(private subnet).
Connectivity Flow: Load balancer initiates traffic to application servers;
application servers respond.
Key checkpoints: routing and security rules.
Analyze Routing: Private subnets typically dont route to an Internet Gateway by
default; they use
NAT or Service Gateways. Misrouting (Option B) would affect outbound traffic,
not inbound from the load balancer.
Security Rules:
Ingress (App Servers): Must allow traffic from the load balancers IP range.
Egress (Load Balancer): Must allow traffic to the application servers.
Evaluate Options:
A: Missing ingress rule on application servers security list blocks load
balancer traffic; most likely.
B: Incorrect default route affects outbound, not inbound; less likely.
C: NAT misconfiguration impacts outbound, not inbound; incorrect.
D: Load balancer egress is necessary but secondary to application server
ingress.
Conclusion: Ingress rule absence on the application server subnet is the primary
blocker.
Security lists control traffic at the subnet level in OCI. The Oracle Networking
Professional study
guide explains, "For a load balancer in a public subnet to communicate with
instances in a private
subnet, the private subnets security list must include an ingress rule allowing
traffic from the load
balancers IP range" (OCI Networking Documentation, Section: Security Lists).
Since Terraform
deployed the infrastructure, a misconfigured security list is a common
oversight.
Reference: Oracle Cloud Infrastructure Documentation - Security Lists.
Certainly, here's a rewritten version of your text:
Packiam Vijendran 1 months ago - Malaysia
Passed the exam yesterday, 95% of the question were from this site. Note: Pay
more attention to all the community discussions on each question, instead of the
answers provided by the examtopics and I strongly suggest to get the contributor
access.
upvoted 4 times
Javier Cardaba Enjuto 2 months, 1 week ago - Spain
Excellent pre-exam session tool
upvoted 2 times
Palanisamy Arulmohan 1 months, 1 week ago - USA
I passed today, 94 questions asked and 99% of them were in this dump.
3 labs: BGP (as-override), HSRP, OSPF (without network statement)
upvoted 4 times
peppinauz 3 months, 2 weeks ago
I pass my exam, dump is valid about 90-95%. review the community answers!!
upvoted 6 times
Oberoi Ankit3 months, 3 weeks ago - USA Texas
Passed exam today dump still accurate. almost all the questions are here, some
are overcomplicated or incomplete on the site,
upvoted 4 times