Latest Version: 6 Question: 1 From which Threat Intelligence providers does Oracle CASB Cloud Service receive information? A. Oracle CASB Cloud Service provides threat intelligence from digital element/Tor/abuse.ch. B. Oracle CASB Cloud Service provides threat intelligence from digital element/Open Threat Exchange/MISP. C. Oracle CASB Cloud Service provides threat intelligence from digital element/Open Threat Exchange/Cymon.io. D. Oracle CASB Cloud Service provides threat intelligence from digital element/MISP/Cymon.io. Answer: A Question: 2 Which two are advantages of using Oracle Configuration and Compliance Cloud Service? (Choose two.) A. It provides insights with highest severity and frequency to prioritize remediation. B. It scores only for benchmark assessments without attaching SLA to the rule-sets. C. It only uses Security Technical Implementation Guides (STIGs) for out-of-the-box automation for 100% compliance of finance systems. D. It scores the benchmark assessment and attaches SLAs to rule-sets, and also uses the STIG. Answer: B,D Question: 3 How can you prevent a user from signing in to Oracle Identity Cloud Service if they are using a device that Oracle Identity Cloud Service does NOT recognize? A. Configure Adaptive Security B. Configure identity provider policies C. Configure Multi-Factor Authentication D. Configure the bridge Answer: B Question: 4 Which industry-standard benchmark engine needs to be configured with Oracle Configuration and Compliance Cloud Service? A. General Data Protection Regulation (GDPR) B. Secure Technical Implementation Guides (STIGs) C. Open Vulnerability and Assessment Language (OVAL) D. Security Content Automation Protocol (SCAP) Answer: D Question: 5 What does Oracle CASB Cloud Service Access Map within Dashboard Summary show? A. suspicious activity and threats that have transpired within Oracle CASB and across different geographical regions or the world B. up to five Application Instances, including API calls showing the geographical regions where the instance was first implemented C. mobile devices users who are actively using Oracle Identity Cloud Services in a manner that is against Oracle Corporate Usage Policy D. a geography of login attempts within Oracle Identity Cloud Service and Oracle Enterprise Resource Planning Cloud, specifically the successful logins Answer: A