Which is a major concern with regards to Line of Business (LOB) buyers when acquiring cloud
services?
C
From the Oracle Management Cloud Security Monitoring and Analytics dashboard, you noticed a
threat of key transfer and suspicious SMB communication activity by a user.
Which two remedial actions will be taken automatically to mitigate some risk? (Choose two.)
A,B
Suspicious events that you or Oracle CASB Cloud Service determine to be serious, result in an entry
in which of these pages?
B
Oracle Security Monitoring and Analytics is built on top of Oracle Log Analytics, and the procedures
for adding and managing entities are identical.
How do you associate entities with existing log sources?
A
Which two features does Oracle CASB Cloud Service support? (Choose two.)
B,C
Which Identity SOC Cloud Service supports auto-access to the configurations in dynamic application
environments?
C
Which Oracle CASB Cloud Service feature could you use to quickly determine whether there is a
concentration of security threats that is originating from a specific geographic area?
A
Which four are the main pillars of the Oracle Identity Security Operations Center (SOC) solution?
(Choose four.)
B,C,E,F
A customer use case requires the second Factor Email during Oracle Identity Cloud Service
Authentication process for a group of users only. The security administrator, signed in Oracle Identity
Cloud Service console, enabled the email factor, edited the default sign-on policy and added a new
sign-on rule. The new sign-on rule included the group name in the member of these groups
conditions and prompt for additional factor every time. The administrator saved both the rule and
the policy.
After executing this configuration, why does the email factor NOT appear to users from that group?
C
What do you add to applications if you want to create custom attributes that can be used to search
for the applications more effectively?
D
Click the exhibit.
According to the diagram, which Oracle Identity Security Operations Center (SOC) component allows
you to monitor Oracle Human Capital Management (HCM) users activity and access management to
avoid service misuse?
D
Which three are key business benefits of Oracle Security Monitoring and Analytics (SMA) Cloud
Service? (Choose three.)
A,B,E
Which feature do you activate in Oracle Identity Cloud Service so that users can use their Microsoft
Active Directory passwords to sign in to access resources that are protected by Oracle Identity Cloud
Service?
D
In which Oracle Identity SOC component can you view threats like file integrity anomaly and
exfiltration attacks and the auto remediation action taken for an application?
A
Which two statements are true for Security Monitoring and Analytics Cloud Service? (Choose two.)
A,B