Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Oracle 1z0-116 - Oracle Database Security Administration

Page: 2 / 3
Total 90 questions

Which two configurations can be used to protect sensitive data In a database?

A.

setting the SQL92_SECURITy initialization parameter to false

B.

enabling salt tor an encrypted column

C.

creating a procedure that defines the VPD restrictions in a VPD policy

D.

collecting sensitive data Information with Database Security Assessment Tool (DBSAT)

E.

enforcing row-level security at the table level

F.

enforcing row-level security at the database level

Examine this output:

Which three are true?

A.

John must connect as system to perform backup and recovery operations.

B.

John can query dba tables.

C.

John can perform backup and recovery operations by using SQL.

D.

John can perform backup and recovery operations by using RMAN.

E.

John must connect as sys to perform backup and recovery operations.

F.

John Is not able to perform startup and shutdown operations.

G.

John can query other user's data.

Examine this parameter In sqinet.ora:

SQLNET.ADTHENTICATION_SEBVICES=(NONE)

For which two cases do you need a password file?

A.

to authenticate externally Identified users locally

B.

to authenticate nonprivllegcd database users locally

C.

to authenticate administrative privileged users remotely

D.

to authenticate externally Identified users remotely

E.

to authenticate nonprivileged database users remotely

F.

to authenticate administrative privileged users locally

You must mask data consistently In three database copies such that data relations across the databases remain In place.

Which Data Masking Format allows this?

A.

Shuffle

B.

Auto Mask

C.

Array List

D.

Substitute

E.

Random Strings

Which four products, features, or methods can help facilitate compliance with various privacy-related regulatory requirements such as PCI-DSS and the EU GDPR?

A.

Data Redaction

B.

Data Guard

C.

Real Application Clusters

D.

Transparent Data Encryption

E.

Data Masking & Subsetting

F.

Table Partitioning

G.

Database Vault

You configured Kerberos authentication for databases running on servers A and B.

However a database link connecting the database on server A to the database on server B fails with ORA-12638 Credential retrieval failed.

Where must you make a change to sqlnet.ora to allow the database link to use its stored credentials Instead of trying to use Kerberos?

A.

on client side of server B

B.

on client side of server A

C.

on server side of server B

D.

on server side of server A

You are Implementing a security policy that makes use of the USERENV namespace.

Which USERRENV value does not change for the duration of a session?

A.

SESSION_CSER

B.

CURRENT_OSER

C.

CURRENT SCHEMA

D.

CLIENT_INFO

Which statement can be used to force password complexity in the password file?

A.

orapwd file=orapwORCL format=12 force-yes

B.

orapwd file=orapwORCL force=yes format=legacy

C.

orapwd file=orapwOPCL forcaat=12

D.

orapwd file=orapwOBCL forroat=12.2

Examine the statement:

CREATE BOLE hr_admin IDENTIFIED USING pac_mgr.hr_admin_rola_ch9ck;

Which three are true about the sec_mgr. hr_admin_role_check procedure?

A.

It must use only one security check to validate the user.

B.

It must use the invokcr's rights to enable the role,

C.

It must use the deflner's rights to enable the role.

D.

It can Include one or more security checks to validate the user.

E.

It must contain a SET ROLE statement or a DBMS_SESSION.SET_ROLE call.

F.

It can use only the DBMS_SESSION. SET_ROLE procedure.

G.

Its owner SEC_MGR must be granted the execute any procedure role.

You grant user JANE the SYSDBA administrative privilege. Which two are true?

A.

User JANE must always connect as SYSDBA to the database instance.

B.

User JANE can grant SYSDBA privilege to roles.

C.

User JANE must use operating system authentication.

D.

User JANE can create objects In sys schema only when connected as SYSDBA.

E.

User JANE acquires the DBA role by default.

F.

User JANE can backup and recover the database.