Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Oracle 1z0-116 - Oracle Database Security Administration

Page: 1 / 3
Total 90 questions

Which two are true about auditing in an Oracle Database?

A.

SYS logon operations are always audited In unified auditing.

B.

All SYS operations are audited by default in unified auditing.

C.

No SYS operations are audited by default In unified auditing.

D.

SYS logon operations are always audited in mixed mode auditing.

E.

No SYS operations are audited if audit_sys_operations is set on false in unified auditing.

F.

No SYS operations are audited if audit_sys_operations is set on false in mixed mode auditing.

Which two statements are true about the Secure External Password Store (SEPS)?

A.

Password credentials are stored on the database server.

B.

Bypassing database authentication adds significant performance benefits to middle-tier applications.

C.

The database does not need to authenticate the connection because the password credentials are stored in a wallet.

D.

Wallet usage secures deployments that rely on password credentials for connecting to databases Instances.

E.

Password rotation policies can be enforced without changing application code.

Which two statements are true about column-level transparent data encryption?

A.

It can bo used for tables in encrypted tablcspaces.

B.

encrypted columns cannot have an Index.

C.

All encrypted columns of a table use the same encryption key.

D.

Column level encrypted data remains encrypted in the buffer cache.

E.

Column-level encryption keys are not encrypted by the master key.

Which two statements are true about Database Vault factors?

A.

A factor can reference a function In another schema to compute its value, provided execute privilege Is granted to the sys user.

B.

Changing a factor type can change how factors are evaluated.

C.

You can configure a factor to be evaluated only once per session.

D.

You get an error at the time of factor creation If the retrieval method function you have specified does not exist.

E.

You can use a factor to enforce conditions for a command rule.

Which two statements are true about Valid Node Checking for Registration (VNCR)?

A.

It denies Instance registration through IPC.

B.

It can only be used with Oracle RAC.

C.

It enforces the Listener connectivity through TCPS.

D.

It is a replacement for Class of Secure Transport (COST).

E.

It restricts specific instances from registering with the Listener.

Examine these commands and responses:

Which object privilege must be granted to allow execution of the stored procedure?

A.

grant EXECUTE ON MARY.PBOC2 Co U1;

B.

grant INHERIT PRIVILEGES ON USER U1 TO MARY;

C.

grant INHERIT PRIVILEGES ON USER MARY TO Ul ;

D.

grant EXECUTE ON Ul.PROC2 TO MARY;

You check the Risk Matrix of the latest Critical Patch Update (CPU).

One of the " Common Vulnerability and Exposure’’ reports (CVEs) has Base Score that is above 9 in the Risk Matrix.

Which one is not a supported method to address this CVE?

A.

Request a one off patch exception from Oracle Support.

B.

Implement a workaround recommended by Oracle Support.

C.

Upgrade to a new Release.

D.

Install a new Release Update.

E.

Install a new Release Update Revision.

While upgrading your Oracle database server from 10g to 19c, you want to ensure that the users can still connect with their current passwords after the upgrade.

What do you need to set explicitly for this purpose?

A.

SQLNET.ALLOWED_LOGON_VERSION_SERVER = 12a in the sqlnet.ora of the new database home

B.

Client net. allowed_lLOGON_VERSION_client must be set to a lower value than the server

SQLNET.ALLOWED LOGON. VEBSION .SERVER.

C.

SQLNET.ALLOWED_LOGON_VERSION_client = 8 in the sqlnec.ora file of the client application.

D.

SQLNET.ALLOWED_LOGON_VERSION_sebveb = 8 In the aqlnec.ora of the new database homo.

Which type of masking directly masks and subsets data In a nonproduction database with minimal or no Impact on production environments?

A.

conditional format

B.

heterogeneous

C.

in-database

D.

deterministic

E.

In-export

Which three are true concerning command rules?

A.

System privileges override command rules.

B.

If a command rule's associated rule set evaluation results In an error, the command is not allowed to execute.

C.

A command can have only one command rule that applies to it.

D.

For DML statement command rules, you can specify a wildcard for the object owner.

E.

If a command rule's associated rule set Is disabled, then the rule set evaluates to true.

F.

For DML statement command rules, you can specify a wildcard for the object name.

G.

Object privileges override command rules.