How are Mobile and Social services enabled in Oracle Access Management Suite 11gR2?
A. by always installing them separately from Access Manager in order to be enabled
B. by clicking the appropriate button in the System Configuration section of Available Services
C. by clicking the appropriate button in the System Configuration section of Common Settings
D. by clicking the appropriate button in the System Configuration section of Plugins
Which statement is true about Oracle Access Manager 11g session management?
A. Oracle Access Manager 11guses Coherence to reliably cache millions of user sessions simultaneously.
B. Oracle Access Manager 11guses encrypted cookies that track the login time, authentication level, and the idle and maximum session times.
C. Oracle Access Manager 11gsession information is stored in lightweight directory access protocol (LDAP) directory.
D. Oracle Access Manager11grequires an Oracle database to reliably store session information.
Your customer has deployed an employee portal that you have protected with Oracle Access Manager (OAM). The customer now wants a new portlet added to the home page to display the employee's salary details. The portlet will obtain the information through a call an internally exposed web service. Your customer has defined the following security requirements for the new portlet:
1.
Employees must be authenticated through risk-based authentication before they can access the portal.
2.
The web service must be secured from unauthenticated calls.
3.
All security logic for the web service must be external to the web service.
4.
The web service should return salary details only if the user's authentication risk score is below 500. Which four steps must you perform to meet the requirements for the new portlet?
A. Deploy Oracle Adaptive Access Manager (OAAM) and integrate it with OAM, settings OAAM as the authentication scheme.
B. Configure Oracle Web Services Manager (OWSM) on the portal container to generate asecurity token.
C. Configure a cookie response in OAM to set the risk score into a cookie calledHTTP_RISK_SCORE.
D. Enable Identity Assertion propagation in the OAM policy.
E. Configure OWSM to call OAAM to obtain the risk score.
F. Configure an OWSMpolicy to protect the web service, consume the security token, and evaluate the risk score.
Identity two settings that are available from the common settings for a session in Oracle Access Manager system configuration.
A. Session Lifetime
B. Minimum Number of Sessions per User
C. Maximum Number of Sessions per User
D. Session Cache Memory size
E. Session Security Protocol
Identify three attributes that are a part of mobile device fingerprinting by default when Oracle Adaptive Access Manager is used.
A. Operating System Type
B. Hardware IMEI Number
C. Hardware MAC address
D. Hardware IP Address
Which two features of Oracle Access Management Mobile and Social are supported only when it is integrated with Oracle Adaptive Access Manager?
A. multi-step authentication (knowledge-based authentication and one-time password support)
B. JWT token support for authentication and authorization
C. ability to uniquely identify connecting mobile devices (device fingerprinting)
D. relying party support for Internet-based Identity Provides (Facebook, Google, Twitter, LinkedIn, and Yahoo)
E. basic (limited) device security checks during device registration and access requests
OAM-OAAM basic integration, which is a native integration, requires the OAM server and OAAM admin server in the same access management domain.
Which two statements are true in the case of OAM-OAAM basic integration?
A. This is unique case in which OAAM data in stored in the OAM schema.
B. The OAAM Managed Server needs to be configured in a separate domain.
C. The OAAM extension libraries are bundled with the OAM server.
D. The knowledge-Based Authentication (KBA) challenge mechanism is available in this integration.
E. Supported agents for this deployment are WebGate 10gand 11g.
You are configuring Oracle Entitlements Server (OES) and have a requirement to make a connection to an external Policy Information Point (PIP) in order to retrieve an attribute for use in a condition.
You need to modify the security module configuration to configure the PIP. Which two options do you have for making this modification?
A. Configure the PIP settings in your OES policy and distribute it to each security module as part of the policy distribution.
B. Manually edit thejps-config.xmlfile on each security module.
C. Use the OES admin console to define the PIP settings and write them to a database for each security module to retrieve during bootstrap.
D. Use the SMConfig UI to configure the settings.
Which two cookies are created whenyouin to Oracle Access Manager 11g with 11g WebGates?
A. ObSSOCookie
B. OAM_ID
C. OAM_AuthnCookie
D. OAM_AuthzCookie
E. WL_AUTHCOOKIE_JSESSIONID
What is the purpose of the extractMovePlan Script when moving an Oracle Access Management environment from to production?
A. It extracts configuration information from the achieve created on the source environment into XML files, which can be edited for the destination environment.
B. It extracts the binary files from the archive created on the source environment into the destination environment.
C. It extracts the configuration files from the archive created on the source environment into the destination environment.
D. It extracts the distribution at a mount point.