New Year Sale ! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Oracle Exam 1Z0-1085-21 Topic 4 Question 18 Discussion

Actual exam question for Oracle's 1Z0-1085-21 exam
Question #: 18
Topic #: 4
[All 1Z0-1085-21 Questions]

Which two security capabilities are offered by Oracle Cloud Infrastructure?

Show Suggested Answer Hide Answer
Suggested Answer: A, D

Oracle Cloud Infrastructure's security approach is based on seven core pillars. Each pillar has multiple solutions designed to maximize the security and compliance of the platform and to help customers to improve their security posture.

High Availability:Offer fault-independent data centers that enable high-availability scale-out architectures and are resilient against network attacks, ensuring constant uptime in the face of disaster and security attack.

Customer Isolation:Allow customers to deploy their application and data assets in an environment that commits full isolation from other tenants and Oracle's staff.

Data Encryption:Protect customerdata at-restandin-transitin a way that allows customers to meet their security and compliance requirements with respect to cryptographic algorithms andkey management.

Security Controls:Offer customers effective and easy-to-use application, platform, and network security solutions that allow them to protect their workloads, have a secure application delivery using a global edge network, constrain access to their services, and segregate operational responsibilities to reduce the risk associated with malicious and accidental user actions.

Visibility:Offer customers comprehensive log data and security analytics that they can use to audit and monitor actions on their resources, allowing them to meet their audit requirements and reduce security and operational risk.

Secure Hybrid Cloud:Enable customers to use their existing security assets, such as user accounts and policies, as well as third-party security solutions, when accessing their cloud resources and securing their data and application assets in the cloud.

Verifiably Secure Infrastructure:Follow rigorous processes and use effective security controls in all phases of cloud service development and operation. Demonstrate adherence to Oracle's strict security standards through third-party audits, certifications, and attestations. Help customers demonstrate compliance readiness to internal security and compliance teams, their customers, auditors, and regulators.


https://docs.cloud.oracle.com/en-us/iaas/Content/Security/Concepts/security_overview.htm

Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77