From the Oracle Management Cloud Security Monitoring and Analytics dashboard, you noticed a threat of key transfer and suspicious SMB communication activity by a user.
Which two remedial actions will be taken automatically to mitigate some risk? (Choose two.)
How do you configure Oracle Identity Cloud Service so that user accounts will never be locked because of consecutive, unsuccessful login attempts?
Oracle Security Monitoring and Analytics is built on top of Oracle Log Analytics, and the procedures for adding and managing entities are identical.
How do you associate entities with existing log sources?
Which two statements are true for Security Monitoring and Analytics Cloud Service? (Choose two.)
Which action to resolve a suspicious event that appears in Risk Events is NOT supported by Oracle CASB Cloud Service?
A customer has a Java application deployed to an on-premises WebLogic server. The application uses WebLogic authentication mechanism. The customer has access to the source code of this application so it can be built and redeployed if necessary.
Which is NOT an option to integrate with Oracle Identity Cloud Service?
From the Oracle Management Cloud dashboard, you noticed a threat or suspicious browsing activity by a user to execute a brute force attack against an application.
Which two remedial actions will happen implicitly to mitigate some risk? (Choose two.)