Yes, by Using Identity Provider Policies
Yes, by Using Identity Provider Policies
Yes, by Using Identity Provider Policies
Q4.Which oracle data safe feature minimize the amount of personal data and allow internal test ,development,and analytics teams to
operate with reduce risk
Data Masking
Q5. How can you synchronize users and groups between Microsoft Active Directory and Oracle Identity Cloud Service?
Q5. You are the administrator of your oracle identity cloud service instance.you have oracle financial coud setup as your identity
provider but have started noticing a problem when users try to federate from financial cloud into IDCS.These users are receving an error
in their browser from IDCS and you are asked to troubleshoot the problemwhat should you do within IDCS
Q6. After executing the config why does the email factor not appears to user from that group
The Passcode Length and Validity Duration of the email factor don't have a default value.
Q7. You require to add a new user to identity cloud service with these criteria.which password policy would you use for this
reqiurments?
Simple
Simple
Standard
Custom
Q9. 20 to change 5 and previous password use
Custom
Q10. How do you configure Oracle Identity Cloud Service so that user accounts will never be locked because of consecutive, unsuccessful
login attempts?
Q11. What do you add to applications if you want to create custom attribute that can be used to search for the applications more
effectively?
A.Audiences
B.Scopes
C.Tags
D.Resources
Q12. Can you customize which of your identity providers appear on the Sign In page when users are accessing Oracle Identity
Cloud Service either locally or through a specific app?
Q14. With which three database deployment options is Data safe include
Autonomous database
Q15. Importing a symmetric key into vault (Bring your own key)
Q16. Top level menu option to add an oracle CASB cloud service user
Q18. Allow group testgroupadmin to manage groups in tenancy where all {target.group.name=/test*/target.group.name!
=’testadministrator’}
Q19. Which IAM policy should be created to grant the orgauditgrp the ability to lookat configuration for all resources except for
those resource inside the dev compartment
Q20. How can you prevent users from sigining in to oracle identity cloudserviceif they using a device that oracle identity cloud
service does not recognize
Q21. Which three task can be performed using the rest API catalog for identity cloud service
Line of Business (LOB) buyers do not have executive approval to acquire such services.
Q24.which standerd provides an XML-based system for authentication and authorization between the service provider and identity
provider
Q25.
Which is a major concern with regards to Line of Business (LOB) buyers when acquiring cloud services?
A. Line of Business (LOB) buyers were buying IT services without notifying their security team.
B. Customers are acquiring services that may not be in compliance with external regulations.
C. Line of Business (LOB) buyers do not have executive approval to acquire such services.
D. End users have no visibility over an organization’s cloud strategy.
From the Oracle Management Cloud dashboard, you noticed a threat or suspicious browsing activity by a user to execute a
brute force attack against an application.
Which two remedial actions will happen implicitly to mitigate some risk? (Choose two.)
A. Multi-factor Authentication (MFA) is imposed
B. User added to suspicious data access watchlist
C. Application policy gets created
D. Host AV update enforced
Due to rapid change in technology and regulatory overhead, companies are challenged to maintain and update the rules as
per the industry standard benchmarks.
Which Oracle service will help in maintaining the industry standard benchmarks?
A. Oracle Configuration and Compliance Cloud Service
B. Oracle Identity Cloud Service
C. Oracle Cloud Access Security Broker (CASB) Cloud Service
D. Oracle Integration Cloud Service
How can you synchronize users and groups between Microsoft Active Directory and Oracle Identity Cloud Service?
A. Use the import utility
B. Configure the Bridge
C. Configure Delegated Authentication
D. Use a flat file