From which Threat Intelligence providers does Oracle CASB Cloud Service receive information?
A. Oracle CASB Cloud Service provides threat intelligence from digital element/Tor/abuse.ch.
B. Oracle CASB Cloud Service provides threat intelligence from digital element/Open Threat Exchange/ MISP.
C. Oracle CASB Cloud Service provides threat intelligence from digital element/Open Threat Exchange/ Cymon.io.
D. Oracle CASB Cloud Service provides threat intelligence from digital element/MISP/Cymon.io.
Which data CANNOT be captured by running out-of-the box operational or historical reports in Oracle Identity Cloud Service?
A. How many times user signed in to Oracle Identity Cloud Service
B. Users who either have signed in to Oracle Identity Cloud Service or who couldn't sign in to Oracle Identity Cloud Service
C. Users who use rogue accounts to sign in to Oracle Identity Cloud Service
D. Users who have been assigned to and removed from Oracle Identity Cloud Service administrator roles
Which key feature must be part of a modern Security Operations Center (SOC)?
A. System access life cycle management
B. Mobile Device Management along with adaptive access management
C. Integration with the business through dashboards and reports by the implementation of Big Data and Machine Learning Techniques
D. Automation and incident response orchestration
If you want to reduce the number of "false positives" appearing in Risk Events, which action would NOT help?
A. filtering custom policy alerts to exclude trusted geographic areas
B. adding trusted users to the User Exclusion List
C. adding suspicious IP addresses to a "blacklist"
D. changing custom policy alerts with Resource or Action set to "Any" to target specific resources and actions
Click to the exhibit.
Which three items fit on the high-level architecture diagram?
A. 1 (Log Analytics Cloud Service), 2 (Database Security Vault), 3 (CASB Cloud Service)
B. 1 (CASB Cloud Service), 2 (Security Monitoring and Analytics Cloud Service), 3 (Log Analytics Cloud Service)
C. 1 (CASB Cloud Service), 2 (Log Analytics Cloud Service), 3 (Security Monitoring and Analytics Cloud Service)
D. 1 (Security Monitoring and Analytics Cloud Service), 2 (CASB Cloud Service), 3 (Log Analytics Cloud Service)
From the Oracle Management Cloud dashboard, you noticed a threat or suspicious browsing activity by a user to execute a brute force attack against an application.
Which two remedial actions will happen implicitly to mitigate some risk? (Choose two.)
A. Multi-factor Authentication (MFA) is imposed
B. User added to suspicious data access watchlist
C. Application policy gets created
D. Host AV update enforced
Which two features describe the monitoring capabilities of Oracle Security Monitoring and Analytics (SMA) Cloud Service? (Choose two.)
A. Monitor application performance comprehensively
B. Detect security threats
C. Proactively monitor, alert, and notify across all infrastructure tiers
D. Dashboard for infrastructure-related metrics like CPU utilization
What do you add to applications if you want to create custom attributes that can be used to search for the applications more effectively?
A. Scopes
B. Resources
C. Audiences
D. Tags
Which is a major concern with regards to Line of Business (LOB) buyers when acquiring cloud services?
A. Line of Business (LOB) buyers were buying IT services without notifying their security team.
B. Customers are acquiring services that may not be in compliance with external regulations.
C. Line of Business (LOB) buyers do not have executive approval to acquire such services.
D. End users have no visibility over an organization's cloud strategy.
In your organization you are planning to implement Oracle Identity SOC as a cloud security solution. What are two reasons for using an Identity SOC Solution? (Choose two.)
A. It incorporates the threat intelligence feeds from IP blacklists and known vulnerable databases only.
B. It uses adaptive ML-based analytics with identity.
C. It provides the ability to have a hybrid enterprise application solution.
D. It provides multiple tools for data operations.