Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Oracle 1z0-116 - Oracle Database Security Administration

Page: 3 / 3
Total 90 questions

Which two tasks should you perform initially to Implement native network encryption without disrupting client applications?

A.

Upgrade all OCI-basod clients to match the database version.

B.

Set the server side sqinet.oia parameter sqlnet.encryption_server = requested.

C.

Configure the listener with an endpoint for protocol TCPS.

D.

Verify which clients have encrypted connections using the view vSsession_CONNECT_INFO.

E.

Set the client side sqinec.ora parameter SQLNET.ENCRYPTION _client = required.

F.

Set the server side sqinot.ora parameter SQLNET.CRYPTO_CHECKSOM_SERVER - accepted.

G.

Modify all JDBC Thin based clients to include network encryption parameters in Java.

Database Vault is not used in your installation.

Why is a conventional secure application role more secure than a normal role?

A.

It Is In effect only when configured as a default role for the user.

B.

It requires a password to be set.

C.

It can be set only by a package or procedure that is created with deflner's rights.

D.

It can be set only by users with the grant any bole privilege.

E.

It can be set only by a package or procedure associated with the role definition.

You must disable OS authentication for database administrative users on a RAC database.

Which option must you use to do this?

A.

Set sqlnet.aothentication_sebvices=(NONe» In sqlnet.ora on the database server.

B.

Remove all OS users from OS groups: osdba, osoper, osbackupdba, osdgdba, osrmdba, OSASMADMIN, OSASMDBA.

C.

Set REMOTE_LOGIH_PASSWORDFILE = EXCLUSIVE In the init.ora file.

D.

Set REMOTE_OS_AUTHENT = FALSE In the init.ora file.

Examine these steps:

1. Run the DBSAT Collector

2. Run the DBSAT Discoverer

3. Run the DBSAT Reporter

Identify the minimum required steps for producing a report of schemas with sensitive data.

A.

1,2

B.

2

C.

1,2,3

D.

2,3

You develop an HR application that must allow multiple sessions to share application attributes. Which statement is executed while implementing the requirement?

A.

CREATE CONTEXT global_hr USING hr_pkg;

B.

CREATE CONTEXT global_hr USING hr_pkg ACCESSED GLOBALLY;

C.

CREATE CONTEXT global_hr USING hr_pkg INITIALIZED GLOBALLY;

D.

CREATE CONTEXT global_hr USING hr_pkg INITIALIZED EXTERNALLY;

Which CVSS Version 3.1 metric indicates how close an attacker needs to be to the vulnerable component?

A.

Privileges Required

B.

User Interaction

C.

Attack Vector

D.

Scope

E.

Availability

F.

Attack Complexity

A policy predicate function Is associated with an enabled Virtual Private Database (VPD) policy for a table.

Which two arguments are passed to the function?

A.

the table name

B.

the schema owning the table

C.

the policy type

D.

the policy name

E.

the policy group to which the policy belongs