You created a virtual cloud network (VCN) with three private subnets.
Two of the subnets contain application servers and the third subnet contains a DB System.
The application requires a shared file system so you have provisioned one using the file storage service (FSS)
You also created the corresponding mount target in one of the application subnets.
The VCN security lists are properly configured so that both application servers and the DB system can access the file system.
The security team determines that the DB System should have read-only access to the file system.
What change should you make to satisfy this requirement?
Click on the arrows to vote for the correct answer
A. B. C. D.A.
The security team has determined that the DB System in the virtual cloud network (VCN) should have read-only access to the file system provisioned using the file storage service (FSS). To satisfy this requirement, one of the following changes should be made:
Option A: Create an NFS export option that allows READ_ONLY access where the source is the CIDR range of the DB System subnet.
This option involves creating an NFS export option that allows read-only access for the CIDR range of the DB System subnet. NFS stands for Network File System and is a distributed file system protocol that allows remote access to files over a network. To implement this option, the following steps should be taken:
Open the File Storage service console and select the file system that was created.
Click on "Export Set" and then on "Create Export Set".
Select the VCN and subnet where the mount target is created.
Add the CIDR range of the DB System subnet to the "Client" field and set the "Access" field to "Read Only".
Click "Create Export Set" to save the changes.
Option B: Modify the security list associated with the subnet where the mount target resides. Change the ingress rules corresponding to the DB System subnet to be stateless.
This option involves modifying the security list associated with the subnet where the mount target resides. Security lists are used to control inbound and outbound traffic for instances and resources within a VCN. To implement this option, the following steps should be taken:
Open the VCN console and select the subnet where the mount target resides.
Click on "Security Lists" and select the security list associated with the subnet.
Click on "Edit All Rules" and locate the ingress rules corresponding to the DB System subnet.
Change the stateful rule to a stateless rule by removing the checkmark from the "Stateful" field.
Click "Save Security List Rules" to save the changes.
Option C: Create an instance principal for the DB System. Write an Identity and Access Management (IAM) policy that allows the instance principal read-only access to the file storage service.
This option involves creating an instance principal for the DB System and writing an IAM policy that allows read-only access to the file storage service. Instance principals are used to authenticate resources running on an instance to access Oracle Cloud Infrastructure services. To implement this option, the following steps should be taken:
Open the Identity and Access Management (IAM) console and create an instance principal for the DB System.
Create an IAM policy that allows read-only access to the file storage service for the instance principal.
Attach the IAM policy to the instance principal.
Option D: Connect via SSH to one of the application servers where the file system has been mounted. Use the Unix command chmod to change permissions on the file system directory, allowing the database user read-only access.
This option involves connecting via SSH to one of the application servers where the file system has been mounted and using the Unix command "chmod" to change permissions on the file system directory, allowing the database user read-only access. "chmod" is a Unix command used to change the permissions of files and directories. To implement this option, the following steps should be taken:
Connect via SSH to one of the application servers where the file system has been mounted.
Use the "ls -l" command to identify the file system directory.
Use the "chmod" command to change the permissions of the file system directory to allow read-only access for the database user.
Verify the changes by using the "ls -l" command again.
Out of these options, option A is the best solution because it directly addresses the requirement to provide read-only access