How can you prevent a user from signing in to Oracle Identity Cloud Service if they are using a device that Oracle Identity Cloud Service does NOT recognize?
A. Configure Adaptive Security
B. Configure identity provider policies
C. Configure Multi-Factor Authentication
D. Configure the bridge
Which industry-standard benchmark engine needs to be configured with Oracle Configuration and Compliance Cloud Service?
A. General Data Protection Regulation (GDPR)
B. Secure Technical Implementation Guides (STIGs)
C. Open Vulnerability and Assessment Language (OVAL)
D. Security Content Automation Protocol (SCAP)
Which two types of severity levels can alerts be generated in, when using Security Monitoring and Analytics (SMA) Cloud Service? (Choose two.)
A. Error
B. Blackout
C. Debug
D. Critical
E. Warning
Which does Oracle CASB Cloud Service NOT support when you add an administrator?
A. Allowing that administrator to view only policy alerts
B. Allowing that administrator to access all Oracle CASB Cloud Service functionality
C. Allowing that administrator to access only specified application instances
D. Allowing that administrator to access only limited Risk Events features
Which omcli command is used to return the status of the agent?
A. agent property
B. agent status
C. status agent
D. status
Which two features describe the monitoring capabilities of Oracle Security Monitoring and Analytics (SMA) Cloud Service? (Choose two.)
A. Monitor application performance comprehensively
B. Detect security threats
C. Proactively monitor, alert, and notify across all infrastructure tiers
D. Dashboard for infrastructure-related metrics like CPU utilization
Which Identity SOC Cloud Service supports auto-access to the configurations in dynamic application environments?
A. Oracle Orchestration Cloud Service
B. Oracle Configuration and Compliance Cloud Service
C. Oracle Identity Cloud Service
D. Oracle Log Analytics Cloud Service
From the Oracle Management Cloud Security Monitoring and Analytics dashboard, you noticed a threat of key transfer and suspicious SMB communication activity by a user.
Which two remedial actions will be taken automatically to mitigate some risk? (Choose two.)
A. User added to suspicious data access watchlist
B. Multi-factor Authentication (MFA) is imposed
C. Host anti-virus (AV) update enforced
D. Targets added to file change watchlist
You want to implement Oracle Configuration and Compliance Cloud Service for the hybrid cloud environments in your organization.
Which two benefits will you get from implementing this? (Choose two.)
A. integration of the different services using open standards
B. Assessment, scoring, and reporting of the compliance in an enterprise can be automated
C. Compliance violation dashboard displays the most severe violations
D. application-wide assessment of compliance score
In your organization you are planning to implement Oracle Identity SOC as a cloud security solution. What are two reasons for using an Identity SOC Solution? (Choose two.)
A. It incorporates the threat intelligence feeds from IP blacklists and known vulnerable databases only.
B. It uses adaptive ML-based analytics with identity.
C. It provides the ability to have a hybrid enterprise application solution.
D. It provides multiple tools for data operations.