You are on page 1of 3

Q2. VCN configuration within a region is valid to have successful local peering using a local peering gateway.

10.0.0.0/16 and 192.168.0.0/16

Q3. How OCI VCN response to compute instance

Q4.Which oracle data safe feature minimize the amount of personal data and allow internal test ,development,and analytics teams to
operate with reduce risk

Data Masking

Q5. How can you synchronize users and groups between Microsoft Active Directory and Oracle Identity Cloud Service?

Q5. You are the administrator of your oracle identity cloud service instance.you have oracle financial coud setup as your identity
provider but have started noticing a problem when users try to federate from financial cloud into IDCS.These users are receving an error
in their browser from IDCS and you are asked to troubleshoot the problemwhat should you do within IDCS

Q6. After executing the config why does the email factor not appears to user from that group

The Passcode Length and Validity Duration of the email factor don't have a default value.

Q7. You require to add a new user to identity cloud service with these criteria.which password policy would you use for this
reqiurments?

Simple

Q8. OCI support 3 password policy

Simple
Standard
Custom
Q9. 20 to change 5 and previous password use

Custom

Q10. How do you configure Oracle Identity Cloud Service so that user accounts will never be locked because of consecutive, unsuccessful
login attempts?

Change the value of the Account Lock Threshold field to 0.

Q11. What do you add to applications if you want to create custom attribute that can be used to search for the applications more
effectively?

A.Audiences

B.Scopes

C.Tags

D.Resources

Q12. Can you customize which of your identity providers appear on the Sign In page when users are accessing Oracle Identity
Cloud Service either locally or through a specific app?

Yes, by using identity provider policies.

Q13. Enable Cloud guard in tenancy, prerequisite

Install the monitoring agent on the instance you want to monitor

Q14. With which three database deployment options is Data safe include

Exadata cloud service


Exadata cloud at customer

Autonomous database

Q15. Importing a symmetric key into vault (Bring your own key)

Q16. Top level menu option to add an oracle CASB cloud service user

Configuration, Admin management

Q17. Mount target

NFS export options

Q18. Allow group testgroupadmin to manage groups in tenancy where all {target.group.name=/test*/target.group.name!
=’testadministrator’}

Q19. Which IAM policy should be created to grant the orgauditgrp the ability to lookat configuration for all resources except for
those resource inside the dev compartment

Allow group orgauditgrp to inspect all-resources in tenancy where target.compartment.name !=dev

Q20. How can you prevent users from sigining in to oracle identity cloudserviceif they using a device that oracle identity cloud
service does not recognize

Configure identity provider policies

Q21. Which three task can be performed using the rest API catalog for identity cloud service

a.perform administrative task

d.mange uses,group,and applications

e.grant application roles to user and groups


Q22. How can you sync user and group between Microsoft AD and Oracle ID cloud

Configure the bridge

Q23. Lob buyer

Line of Business (LOB) buyers do not have executive approval to acquire such services.
Q24.which standerd provides an XML-based system for authentication and authorization between the service provider and identity
provider

SAML (Security Assertion Markup Language)

Q25.

Which is a major concern with regards to Line of Business (LOB) buyers when acquiring cloud services?
A. Line of Business (LOB) buyers were buying IT services without notifying their security team.
B. Customers are acquiring services that may not be in compliance with external regulations.
C. Line of Business (LOB) buyers do not have executive approval to acquire such services.
D. End users have no visibility over an organization’s cloud strategy.

From the Oracle Management Cloud dashboard, you noticed a threat or suspicious browsing activity by a user to execute a
brute force attack against an application.
Which two remedial actions will happen implicitly to mitigate some risk? (Choose two.)
A. Multi-factor Authentication (MFA) is imposed
B. User added to suspicious data access watchlist
C. Application policy gets created
D. Host AV update enforced
Due to rapid change in technology and regulatory overhead, companies are challenged to maintain and update the rules as
per the industry standard benchmarks.
Which Oracle service will help in maintaining the industry standard benchmarks?
A. Oracle Configuration and Compliance Cloud Service
B. Oracle Identity Cloud Service
C. Oracle Cloud Access Security Broker (CASB) Cloud Service
D. Oracle Integration Cloud Service

How can you synchronize users and groups between Microsoft Active Directory and Oracle Identity Cloud Service?
A. Use the import utility
B. Configure the Bridge
C. Configure Delegated Authentication
D. Use a flat file

You might also like