Download Oracle Cloud Platform ​Identity and Security ​Management 2020 Specialist.PremDumps.1Z0‐1070-20.2021-02-04.1e.67q.vcex

Download Exam

File Info

Exam Oracle Cloud Platform ​Identity and Security ​Management 2020 Specialist
Number 1Z0‐1070-20
File Name Oracle Cloud Platform ​Identity and Security ​Management 2020 Specialist.PremDumps.1Z0‐1070-20.2021-02-04.1e.67q.vcex
Size 199 Kb
Posted February 04, 2021
Downloads 54
Download Oracle Cloud Platform ​Identity and Security ​Management 2020 Specialist.PremDumps.1Z0‐1070-20.2021-02-04.1e.67q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%



 
 



Demo Questions

Question 1

From which Threat Intelligence providers does Oracle CASB Cloud Service receive information?

  • A: Oracle CASB Cloud Service provides threat intelligence from digital element/Tor/abuse.ch.
  • B: Oracle CASB Cloud Service provides threat intelligence from digital element/Open Threat Exchange/MISP.
  • C: Oracle CASB Cloud Service provides threat intelligence from digital element/Open Threat Exchange/Cymon.io.
  • D: Oracle CASB Cloud Service provides threat intelligence from digital element/MISP/Cymon.io.

Correct Answer: A




Question 2

Which two are advantages of using Oracle Configuration and Compliance Cloud Service? (Choose two.)

  • A: It provides insights with highest severity and frequency to prioritize remediation.
  • B: It scores only for benchmark assessments without attaching SLA to the rule-sets.
  • C: It only uses Security Technical Implementation Guides (STIGs) for out-of-the-box automation for 100% compliance of finance systems.
  • D: It scores the benchmark assessment and attaches SLAs to rule-sets, and also uses the STIG.

Correct Answer: BD




Question 3

How can you prevent a user from signing in to Oracle Identity Cloud Service if they are using a device that Oracle Identity Cloud Service does NOT recognize?

  • A: Configure Adaptive Security
  • B: Configure identity provider policies
  • C: Configure Multi-Factor Authentication
  • D: Configure the bridge

Correct Answer: B




Question 4

Which industry-standard benchmark engine needs to be configured with Oracle Configuration and Compliance Cloud Service?

  • A: General Data Protection Regulation (GDPR)
  • B: Secure Technical Implementation Guides (STIGs)
  • C: Open Vulnerability and Assessment Language (OVAL)
  • D: Security Content Automation Protocol (SCAP)

Correct Answer: D




Question 5

What does Oracle CASB Cloud Service Access Map within Dashboard Summary show?

  • A: suspicious activity and threats that have transpired within Oracle CASB and across different geographical regions or the world 
  • B: up to five Application Instances, including API calls showing the geographical regions where the instance was first implemented
  • C: mobile devices users who are actively using Oracle Identity Cloud Services in a manner that is against Oracle Corporate Usage Policy
  • D: a geography of login attempts within Oracle Identity Cloud Service and Oracle Enterprise Resource Planning Cloud, specifically the successful logins

Correct Answer: A




Question 6

Which do you configure if you need to supplement the risk events that are automatically created in the Oracle CASB Cloud Service?

  • A: Configure Notifications
  • B: Configure Incidents
  • C: Configure Custom Risk Events
  • D: Configure Custom Policy

Correct Answer: D




Question 7

Which two services in Oracle Identity SOC solution have machine learning built into it? (Choose two.)

  • A: Oracle Integration Cloud Service
  • B: Oracle CASB Cloud Service
  • C: Oracle Security Monitoring and Analytics Cloud Service
  • D: Oracle Application Performance Monitoring Cloud Service

Correct Answer: AC




Question 8

You want to configure Oracle Identity Cloud Service so that any users who use an IP address that comes from a country where hacking is rampant are prevented from accessing Oracle Identity Cloud Service. 
How would you accomplish this?

  • A: Define a network perimeter, assign it to a rule of a sign-on policy, and set the access for the rule to be denied.
  • B: Define a network perimeter, assign it to a rule of a sign-on policy, set the access for the rule to be denied, and define risk-related conditions in the rule associated with the user¶s location.
  • C: Define a network perimeter and assign it to a rule of a sign-on policy.
  • D: Define a network perimeter.

Correct Answer: A




Question 9

Which three represent the different types of Identity SOC architectural models? (Choose three.)

  • A: Dedicated SOC
  • B: Privileged SOC
  • C: Fusion SOC
  • D: Shared SOC
  • E: Virtual SOC 

Correct Answer: ADE




Question 10

Which three security services are provided in the Identity SOC framework? (Choose three.)

  • A: Oracle Application Performance Monitoring Cloud Service
  • B: Oracle Orchestration Cloud Service
  • C: Oracle Configuration and Compliance Cloud Service
  • D: Oracle Log Analytics Cloud Service
  • E: Oracle CASB Cloud Service

Correct Answer: BCE










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files