Which is a top challenge for a Security Operations Center (SOC) Manager?
A. to keep all systems in compliance within 30 days of new security regulations
B. to ensure network and systems uptime to meet organization and customer SLAs
C. to identify threats proactively while maintaining organization and customer SLAs
D. to design and implement a software development life cycle program
How does a threat progression get identified in Identity SOC?
A. Oracle CASB Cloud Service receives the threat intel from various data sources including Oracle Identity Cloud Service, and based on user behavior creates a threat in the Oracle CASB Cloud Service Threat Dashboard.
B. Configuration and Compliance Cloud Service identifies the Configuration drift and forwards it to Oracle CASB Cloud Service, and based on user behavior identified from Oracle Identity Cloud Service creates the threat based on the risk score in Oracle CASB Cloud Service Threat dashboard.
C. Oracle Security Monitoring and Analytics Cloud Service receives the threat intel from various data sources including Oracle Identity Cloud Service and Oracle CASB Cloud Service, and based on user behavior creates a threat based on the risk score in Oracle Security Monitoring and Analytics Cloud Service Threat dashboard.
D. Oracle Orchestration Cloud Service receives the threat information from Oracle Security Monitoring Cloud Service and Oracle Identity Cloud Service, and various sources based on the information received from other sources creates a threat in Oracle CASB Cloud Service Threat dashboard.
Which Oracle Identity Security Operations Center (SOC) component detects SQL query anomalies for any database or application?
A. Oracle Configuration and Compliance Cloud Service
B. Oracle Identity Cloud Service
C. Oracle Security Monitoring and Analytics Cloud Service
D. Oracle CASB Cloud Service
Which data CANNOT be captured by running out-of-the box operational or historical reports in Oracle Identity Cloud Service?
A. How many times user signed in to Oracle Identity Cloud Service
B. Users who either have signed in to Oracle Identity Cloud Service or who couldn't sign in to Oracle Identity Cloud Service
C. Users who use rogue accounts to sign in to Oracle Identity Cloud Service
D. Users who have been assigned to and removed from Oracle Identity Cloud Service administrator roles
From which Threat Intelligence providers does Oracle CASB Cloud Service receive information?
A. Oracle CASB Cloud Service provides threat intelligence from digital element/Tor/abuse.ch.
B. Oracle CASB Cloud Service provides threat intelligence from digital element/Open Threat Exchange/ MISP.
C. Oracle CASB Cloud Service provides threat intelligence from digital element/Open Threat Exchange/ Cymon.io.
D. Oracle CASB Cloud Service provides threat intelligence from digital element/MISP/Cymon.io.
Which two are advantages of using Oracle Configuration and Compliance Cloud Service? (Choose two.)
A. It provides insights with highest severity and frequency to prioritize remediation.
B. It scores only for benchmark assessments without attaching SLA to the rule-sets.
C. It only uses Security Technical Implementation Guides (STIGs) for out-of-the-box automation for 100% compliance of finance systems.
D. It scores the benchmark assessment and attaches SLAs to rule-sets, and also uses the STIG.
How can you prevent a user from signing in to Oracle Identity Cloud Service if they are using a device that Oracle Identity Cloud Service does NOT recognize?
A. Configure Adaptive Security
B. Configure identity provider policies
C. Configure Multi-Factor Authentication
D. Configure the bridge
Which industry-standard benchmark engine needs to be configured with Oracle Configuration and Compliance Cloud Service?
A. General Data Protection Regulation (GDPR)
B. Secure Technical Implementation Guides (STIGs)
C. Open Vulnerability and Assessment Language (OVAL)
D. Security Content Automation Protocol (SCAP)
What does Oracle CASB Cloud Service Access Map within Dashboard Summary show?
A. suspicious activity and threats that have transpired within Oracle CASB and across different geographical regions or the world
B. up to five Application Instances, including API calls showing the geographical regions where the instance was first implemented
C. mobile devices users who are actively using Oracle Identity Cloud Services in a manner that is against Oracle Corporate Usage Policy
D. a geography of login attempts within Oracle Identity Cloud Service and Oracle Enterprise Resource Planning Cloud, specifically the successful logins
Which do you configure if you need to supplement the risk events that are automatically created in the Oracle CASB Cloud Service?
A. Configure Notifications
B. Configure Incidents
C. Configure Custom Risk Events
D. Configure Custom Policy
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Oracle exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1Z0-1070-20 exam preparations and Oracle certification application, do not hesitate to visit our Vcedump.com to find your solutions here.