Download Oracle Cloud Platform Identity and Security Management 2018 Associate.1z0-933.CertKiller.2019-05-31.33q.vcex

Vendor: Oracle
Exam Code: 1z0-933
Exam Name: Oracle Cloud Platform Identity and Security Management 2018 Associate
Date: May 31, 2019
File Size: 261 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
How can you prevent a user from signing in to Oracle Identity Cloud Service if they are using a device that Oracle Identity Cloud Service does NOT recognize?
  1. Configure Adaptive Security
  2. Configure identity provider policies
  3. Configure Multi-Factor Authentication
  4. Configure the bridge
Correct answer: B
Explanation:
Reference: https://docs.oracle.com/en/cloud/paas/identity-cloud/idcwn/index.html#IDCWN-GUID-BC1C3C92-B422-4088-BFDF-BD0A3FEF326E
Reference: https://docs.oracle.com/en/cloud/paas/identity-cloud/idcwn/index.html#IDCWN-GUID-BC1C3C92-B422-4088-BFDF-BD0A3FEF326E
Question 2
You want to configure Oracle Identity Cloud Service so that any users who use an IP address that comes from a country where hacking is rampant are prevented from accessing Oracle Identity Cloud Service. 
How would you accomplish this?
  1. Define a network perimeter, assign it to a rule of a sign-on policy, and set the access for the rule to be denied.
  2. Define a network perimeter, assign it to a rule of a sign-on policy, set the access for the rule to be denied, and define risk-related conditions in the rule associated with the user’s location.
  3. Define a network perimeter and assign it to a rule of a sign-on policy.
  4. Define a network perimeter.
Correct answer: A
Explanation:
Reference: https://docs.oracle.com/en/cloud/paas/identity-cloud/uaids/understanding-network-perimeters.html
Reference: https://docs.oracle.com/en/cloud/paas/identity-cloud/uaids/understanding-network-perimeters.html
Question 3
In your organization, security operations complains about the shortage of resources to handle the number of alerts generated from the security products deployed. 
You want to automate the process of handling and remediating the alerts and also want to add contextual awareness to adapt to the threats in real time. 
Which would provide the required solution?
  1. Oracle Integration Cloud Service
  2. Oracle Identity Security Operations Center (SOC)
  3. Oracle Configuration and Compliance Cloud Service
  4. Oracle Log Analytics Cloud Service
Correct answer: B
Question 4
How does a threat progression get identified in Identity SOC?
  1. Oracle CASB Cloud Service receives the threat intel from various data sources including Oracle Identity Cloud Service, and based on user behavior creates a threat in the Oracle CASB Cloud Service Threat Dashboard.
  2. Configuration and Compliance Cloud Service identifies the Configuration drift and forwards it to Oracle CASB Cloud Service, and based on user behavior identified from Oracle Identity Cloud Service creates the threat based on the risk score in Oracle CASB Cloud Service Threat dashboard.
  3. Oracle Security Monitoring and Analytics Cloud Service receives the threat intel from various data sources including Oracle Identity Cloud Service and Oracle CASB Cloud Service, and based on user behavior creates a threat based on the risk score in Oracle Security Monitoring and Analytics Cloud Service Threat dashboard.
  4. Oracle Orchestration Cloud Service receives the threat information from Oracle Security Monitoring Cloud Service and Oracle Identity Cloud Service, and various sources based on the information received from other sources creates a threat in Oracle CASB Cloud Service Threat dashboard.
Correct answer: A
Question 5
Which data CANNOT be captured by running out-of-the box operational or historical reports in Oracle Identity Cloud Service?
  1. How many times user signed in to Oracle Identity Cloud Service
  2. Users who either have signed in to Oracle Identity Cloud Service or who couldn’t sign in to Oracle Identity Cloud Service
  3. Users who use rogue accounts to sign in to Oracle Identity Cloud Service
  4. Users who have been assigned to and removed from Oracle Identity Cloud Service administrator roles
Correct answer: D
Question 6
One of the required tasks for setting up Oracle Security Monitoring and Analytics is “Add Log Analytics entities”. After updating a file that contains the entity definition that you want to add, which omcli command needs to be run? 
  1. <AGENT_BASE_DIR>/agent_inst/bin/omcli setproperty agent FILENAME
  2. <AGENT_BASE_DIR>/agent_inst/bin/omcli register agent FILENAME
  3. <AGENT_BASE_DIR>/omcli setproperty agent FILENAME
  4. <AGENT_BASE_DIR>/agent_inst/bin/omcli add_entity agent FILENAME
Correct answer: D
Explanation:
Reference: https://docs.oracle.com/en/cloud/paas/management-cloud/gfadg/working-oracle-management-cloud.pdf
Reference: https://docs.oracle.com/en/cloud/paas/management-cloud/gfadg/working-oracle-management-cloud.pdf
Question 7
Which two users should run Security Content Automation Protocol (SCAP) assessments? (Choose two.)
  1. opc
  2. root
  3. privileged sudo user
  4. oracle
Correct answer: BC
Explanation:
Reference: https://docs.oracle.com/en/cloud/paas/management-cloud/comcs/assessing-compliance-industry-standards.html#GUID-72D97C34-A944-4EC9-B387-1F2529A3D491
Reference: https://docs.oracle.com/en/cloud/paas/management-cloud/comcs/assessing-compliance-industry-standards.html#GUID-72D97C34-A944-4EC9-B387-1F2529A3D491
Question 8
Which is a top challenge for a Security Operations Center (SOC) Manager?
  1. to keep all systems in compliance within 30 days of new security regulations
  2. to ensure network and systems uptime to meet organization and customer SLAs
  3. to identify threats proactively while maintaining organization and customer SLAs
  4. to design and implement a software development life cycle program
Correct answer: C
Explanation:
Reference: https://www.dflabs.com/the-top-5-challenges-faced-by-security-operations-center/
Reference: https://www.dflabs.com/the-top-5-challenges-faced-by-security-operations-center/
Question 9
Your company is in the banking industry and offers financial services to the public online. You just became aware of a Phishing attack on your customers. This attack prompts your clients to log into fake websites with their password. As the system administrator, what can you turn on with Oracle Security Monitoring and Analytics Cloud Service that could help protect your clients?
  1. Lock all user accounts
  2. Send out notifications to clients to change their password.
  3. Turn on multi factor authentication
  4. Disable online access
Correct answer: B
Question 10
Which key feature must be part of a modern Security Operations Center (SOC)?
  1. System access life cycle management
  2. Mobile Device Management along with adaptive access management
  3. Integration with the business through dashboards and reports by the implementation of Big Data and Machine Learning Techniques
  4. Automation and incident response orchestration
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!