You want to configure Oracle Identity Cloud Service so that any users who use an IP address that comes from a country where hacking is rampant are prevented from accessing Oracle Identity Cloud Service.
How would you accomplish this?
A. Define a network perimeter, assign it to a rule of a sign-on policy, and set the access for the rule to be denied.
B. Define a network perimeter, assign it to a rule of a sign-on policy, set the access for the rule to be denied, and define risk-related conditions in the rule associated with the user's location.
C. Define a network perimeter and assign it to a rule of a sign-on policy.
D. Define a network perimeter.
Which two users should run Security Content Automation Protocol (SCAP) assessments? (Choose two.)
A. opc
B. root
C. privileged sudo user
D. oracle
Click to the exhibit.
Which three items fit on the high-level architecture diagram?
A. 1 (Log Analytics Cloud Service), 2 (Database Security Vault), 3 (CASB Cloud Service)
B. 1 (CASB Cloud Service), 2 (Security Monitoring and Analytics Cloud Service), 3 (Log Analytics Cloud Service)
C. 1 (CASB Cloud Service), 2 (Log Analytics Cloud Service), 3 (Security Monitoring and Analytics Cloud Service)
D. 1 (Security Monitoring and Analytics Cloud Service), 2 (CASB Cloud Service), 3 (Log Analytics Cloud Service)
How do you configure Oracle Identity Cloud Service so that user accounts will never be locked because of consecutive, unsuccessful login attempts?
A. Change the value of the Max unsuccessful MFA attempts field to 0.
B. Change the time of the lockout duration interval to 0 seconds.
C. Change the value of the Account Lock Threshold field to 0.
D. Modify a rule of the default sign-on policy.
You want a user to perform the following administrative tasks in Oracle Identity Cloud Service:
customizing the interface, default settings, notifications, and the password policy;
configuring Multi- Factor Authentication (MFA);
and managing bridges, identity providers, and trusted partner certificates.
To which administrator role do you assign this user?
A. Application administrator
B. Audit administrator
C. User administrator
D. Security administrator
Which two steps are required to integrate Security Monitoring and Analytics Cloud Service with Identity Cloud Service? (Choose two.)
A. In Security Monitoring and Analytics Cloud Service under Security Admin Select Identity Cloud Service, click Create Identity Context Configuration and specify the grant type/Client ID/Client Secret/scope information collected from Identity Cloud Service.
B. Create a trusted application in Identity Cloud Service and collect the grant type/Client ID/Client Secret/ scope for the application created.
C. Create a Security Monitoring and Analytics Cloud Service Application in Identity Cloud Service and collect the grant type/Client ID/Client Secret/scope for the application created.
D. In Security Monitoring and Analytics Cloud Service under Security Admin Select Identity Context, click Create Identity Context Configuration and specify the grant type/Client ID/Client Secret/scope information collected from Identity Cloud Service.
In which Oracle Identity SOC component can you view threats like file integrity anomaly and exfiltration attacks and the auto remediation action taken for an application?
A. Oracle CASB Cloud Service
B. Oracle Identity Cloud Service
C. Oracle Configuration and Compliance Cloud Service
D. Oracle Security Monitoring and Analytics Cloud Service
Which two features does Oracle CASB Cloud Service support? (Choose two.)
A. automatically resolves suspicious events that occur
B. security controls for custom applications running on AWS
C. prevents unauthorized access to cloud application files
D. security controls for Oracle ERP Cloud Service
You hire a third-party company to work in your Oracle Cloud environment. These partner employees work remotely and need to manage PaaS and IaaS instances in your environment. Your security officer requires that each partner employee provide a second verification factor on top of the traditional user name and password.
Which option do you configure in Oracle Identity Cloud Service for this to occur?
A. Multi-Factor Authentication
B. Adaptive security
C. The bridge
D. Identity provider policies
Can you customize which of your identity providers appear on the Sign In page when users are accessing Oracle Identity Cloud Service either locally or through a specific app?
A. No, because users should always sign in using their local authentication credentials.
B. Yes, by using identity provider policies.
C. Yes, by using sign-on policies.
D. No, because any identity provider that's set to appear in the Sign In page will be displayed.