Which three security services are provided in the Identity SOC framework? (Choose three.)
A. Oracle Application Performance Monitoring Cloud Service
B. Oracle Orchestration Cloud Service
C. Oracle Configuration and Compliance Cloud Service
D. Oracle Log Analytics Cloud Service
E. Oracle CASB Cloud Service
One of the required tasks for setting up Oracle Security Monitoring and Analytics is "Add Log Analytics entities". After updating a file that contains the entity definition that you want to add, which omcli command needs to be run?
A.
B.
C.
D.
Which is a top challenge for a Security Operations Center (SOC) Manager?
A. to keep all systems in compliance within 30 days of new security regulations
B. to ensure network and systems uptime to meet organization and customer SLAs
C. to identify threats proactively while maintaining organization and customer SLAs
D. to design and implement a software development life cycle program
Which product needs to be deployed with Identity SOC?
A. Oracle Management Cloud Gateway
B. Oracle CASB Cloud Service agent
C. Oracle Cloud Agent
D. Oracle Application Gateway
Which two issues can be resolved by using Oracle Configuration and Compliance Cloud Service? (Choose two.)
A. A single timely compliance posture across the enterprise
B. Manual compliance attestation to check rules and benchmarks
C. Assessments across multiple data centers for a timely global compliance posture
D. Extend pre-built benchmarks with custom rules to meet requirements
Which two features describe the monitoring capabilities of Oracle Security Monitoring and Analytics (SMA) Cloud Service? (Choose two.)
A. Monitor application performance comprehensively
B. Detect security threats
C. Proactively monitor, alert, and notify across all infrastructure tiers
D. Dashboard for infrastructure-related metrics like CPU utilization
Which four are the main pillars of the Oracle Identity Security Operations Center (SOC) solution? (Choose four.)
A. Threat Intelligence
B. Cloud Access Security Broker (CASB)
C. Security information and event management (SIEM)
D. IT Orchestration
E. Application Performance
F. User Entity Behavior and Analytics (UEBA)
Which Oracle CASB Cloud Service feature could you use to quickly determine whether there is a concentration of security threats that is originating from a specific geographic area?
A. Access Map
B. Key Security Indicators
C. Risk Events
D. Reports
Oracle Security Monitoring and Analytics is built on top of Oracle Log Analytics, and the procedures for adding and managing entities are identical.
How do you associate entities with existing log sources?
A. Create a group in the administration console in Oracle Management Cloud.
B. Use the Oracle Log Analytics Entities page.
C. Edit property values for existing entries.
D. Create and set global properties.
Which option specifies the two major tasks involved in setting up most cloud applications to be monitored by Oracle CASB Cloud Service?
A. defining reports for the application and importing users for the application into Oracle CASB Cloud Service
B. creating policy alerts for the application and creating a tenant admin for the application in Oracle CASB Cloud Service
C. creating a special account in the application and registering the application in Oracle CASB Cloud Service
D. defining incidents to be monitored and risk events to be reported by Oracle CASB Cloud Service
You hire a third-party company to work in your Oracle Cloud environment. These partner employees work remotely and need to manage PaaS and IaaS instances in your environment. Your security officer requires that each partner employee provide a second verification factor on top of the traditional user name and password.
Which option do you configure in Oracle Identity Cloud Service for this to occur?
A. Multi-Factor Authentication
B. Adaptive security
C. The bridge
D. Identity provider policies
You are the system administrator using the Management Cloud Dashboard to monitor your production environments. One of your global applications is yellow and upon further investigation on that application, it was identified that one of the users appears to be logging in to the application from multiple distant locations minutes apart. This appears to be a security threat.
Which remediation rule should be configured to address this type of incident?
A. Configure an Identity Cloud Service remediation rule to lock user accounts that log into the application from different locations that occur within a minute of each attempt.
B. Configure an Identity Cloud Service remediation rule to lock all the users accounts.
C. Configure a notification to the user to have them reset their password.
D. Disable all connectivity to the application from the suspicious region.
You want to implement Oracle Configuration and Compliance Cloud Service for the hybrid cloud environments in your organization.
Which two benefits will you get from implementing this? (Choose two.)
A. integration of the different services using open standards
B. Assessment, scoring, and reporting of the compliance in an enterprise can be automated
C. Compliance violation dashboard displays the most severe violations
D. application-wide assessment of compliance score
Can you customize which of your identity providers appear on the Sign In page when users are accessing Oracle Identity Cloud Service either locally or through a specific app?
A. No, because users should always sign in using their local authentication credentials.
B. Yes, by using identity provider policies.
C. Yes, by using sign-on policies.
D. No, because any identity provider that's set to appear in the Sign In page will be displayed.
In your organization you are planning to implement Oracle Identity SOC as a cloud security solution. What are two reasons for using an Identity SOC Solution? (Choose two.)
A. It incorporates the threat intelligence feeds from IP blacklists and known vulnerable databases only.
B. It uses adaptive ML-based analytics with identity.
C. It provides the ability to have a hybrid enterprise application solution.
D. It provides multiple tools for data operations.