In an enterprise deployment, where are the binary and library files that are required for Oracle Access Management located? (Choose the best answer.)
A. IDM_ORACLE_HOME
B. IAM_ORACLE_HOME
C. ORACLE_COMMON_HOME
D. IAM_MW_HOME/iam
Your customer has deployed an employee portal that you have protected with Oracle Access Manager (OAM). The customer now wants a new portlet added to the home page to display the employee's salary details. The portlet will obtain the information through a call an internally exposed web service. Your customer has defined the following security requirements for the new portlet:
1.
Employees must be authenticated through risk-based authentication before they can access the portal.
2.
The web service must be secured from unauthenticated calls.
3.
All security logic for the web service must be external to the web service.
4.
The web service should return salary details only if the user's authentication risk score is below 500. Which four steps must you perform to meet the requirements for the new portlet?
A. Deploy Oracle Adaptive Access Manager (OAAM) and integrate it with OAM, settings OAAM as the authentication scheme.
B. Configure Oracle Web Services Manager (OWSM) on the portal container to generate asecurity token.
C. Configure a cookie response in OAM to set the risk score into a cookie calledHTTP_RISK_SCORE.
D. Enable Identity Assertion propagation in the OAM policy.
E. Configure OWSM to call OAAM to obtain the risk score.
F. Configure an OWSMpolicy to protect the web service, consume the security token, and evaluate the risk score.
How would you add support for additional Internet Identity Providers for Oracle Access Management Mobile and Social, other than the preconfigured ones such as Facebook and LinkedIn? (Choose the best answer.)
A. You do this by implementing theoracle.security.idaas.rp.spi.ServiceproviderJava interface.
B. Support for Internet Identity Providers is limited to the ones that are available out of the box from Oracle Access Management.
C. Support for Internet Identity Providers is enabled through the connectors built on the Identity Connector Framework (ICF).
D. You do this by implementing theoracle.security.idaas.rp.spi.IdentityProviderJava interface.
What would you need to configure to migrate all agents (WebGates) with different transport security modes from Oracle Access Manager 10g to Oracle Access Manager 11g in the same transport security mode.
A. Set themigration_modeproperty in theoam_migration.propertiesfile toCOMPLETE.
B. Set theagent_mode_to_overrideproperty in theoam_migration.propertiesfile to the new security mode.
C. Set theagent_mode_to_overrideproperty in theoam_migration.propertiesfile toRETAIN_EXISTING.
D. No configuration is required because this is done by default.
Which two earlier technologies does Oracle Access Manager 11g replace and provide a converged platform for? (Choose two.)
A. Oracle Access Manager 10g
B. Oracle Identity Manager 10g
C. Oracle Application Server SSO (OSSO) 10g
D. Oracle WebCenter 10g
E. Oracle Enterprise Single Sing-On
Which three types of attributes does Oracle Entitlements Server support?
A. resource attributes
B. dynamic attributes
C. context attributes
D. information attributes
E. request attributes
Identify two artifacts that are present in an application domain of Oracle Access Manager 11g.
A. Resources
B. Authentication Scheme
C. Authentication Policies
D. Authentication Modules
E. Data Sources
Which two services can be enabled from the Oracle Access Management 11gR2 console?
A. Identity Federation
B. Oracle Adaptive Access Manager
C. Mobile and Social
D. Oracle Entitlements Server
E. Oracle API Gateway
What performance data can you see from the Oracle Adaptive Access Manager (OAAM) 11g admin dashboard?
A. averageprocessing times
B. number of threads running
C. CPU utilization
D. memory utilization
Which protocol does WebGate use to communicate with the Access Manager server? (choose the best answer.)
A. TCP
B. HTTP
C. SSL
D. Oracle AccessProtocol (OAP)
E. Policy Administration Protocol (PAP)