Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Oracle 1z0-116 Dumps

Page: 1 / 3
Total 90 questions

Oracle Database Security Administration Questions and Answers

Question 1

The listener configuration contains these lines related to Valid Node Checking for Registration (VNCR);

Which two statements are true?

Options:

A.

Both parameters cannot be set at the same time so will be Ignored.

B.

Listener listener will allow instance registration from IP address 192.168.20.2.

C.

Listener listener will allow Instance registration from

REGISTRATION_INVITED_NODES_LISTENEP.

D.

Listener listener will only deny instance registration from

REGISTRATION EXCLUDED NODES LISTENER.

E.

Listener listener will deny instance registration from IP address 192.168.20.2.

Question 2

Examine these commands and responses:

User Karen is an enterprise user.

Which two commands are used to allow this login?

Options:

A.

GRANT CREATE SESSION TO karan;

B.

CREATE USER guest IDENTIFIED BY karen;

C.

CREATE USER karen IDENTIFIED BY guest;

D.

CREATE USER guest IDENTIFIED GLOBALLY as '';

E.

GRANT CREATE SESSION TO guest;

Question 3

A policy predicate function Is associated with an enabled Virtual Private Database (VPD) policy for a table.

Which two arguments are passed to the function?

Options:

A.

the table name

B.

the schema owning the table

C.

the policy type

D.

the policy name

E.

the policy group to which the policy belongs

Question 4

You are Implementing a security policy that makes use of the USERENV namespace.

Which USERRENV value does not change for the duration of a session?

Options:

A.

SESSION_CSER

B.

CURRENT_OSER

C.

CURRENT SCHEMA

D.

CLIENT_INFO

Question 5

What does the Application Data Modeling module of the Oracle Data Masking and Subsetting Pack search for?

Options:

A.

data redaction policies

B.

data masking transformations

C.

parent/child relationships between the columns holding sensitive information

D.

encrypted columns

Question 6

The sqinet.oia file on the client contains this parameter setting:

SQLNET.ENCRYPTION_CLIEKT = REQUESTED

What value for the parameter sQLNET.ENCRYPTION _server In the sqlnet.ora file on the server will disable Encryption and Data Negotiation?

Options:

A.

REQUESTED

B.

ACCEPTED

C.

REQUIRED

D.

REJECTED

Question 7

Which two tasks should you perform initially to Implement native network encryption without disrupting client applications?

Options:

A.

Upgrade all OCI-basod clients to match the database version.

B.

Set the server side sqinet.oia parameter sqlnet.encryption_server = requested.

C.

Configure the listener with an endpoint for protocol TCPS.

D.

Verify which clients have encrypted connections using the view vSsession_CONNECT_INFO.

E.

Set the client side sqinec.ora parameter SQLNET.ENCRYPTION _client = required.

F.

Set the server side sqinot.ora parameter SQLNET.CRYPTO_CHECKSOM_SERVER - accepted.

G.

Modify all JDBC Thin based clients to include network encryption parameters in Java.

Question 8

You Issue this statement as user SYS:

audit, context namespace kilimanjaro attributes a, b;

Which is true?

Options:

A.

The statement will audit all users.

B.

The statement will not audit any users.

C.

The statement will only audit sys.

D.

The statement must be updated to specify which users to audit.

Question 9

Examine this query:

Why is this account in this status?

Options:

A.

The account uses a global authentication.

B.

The user exceeded the value of FAILED_LOGIN _ATTEMPTS and its password has not been reset yet.

C.

The account has the SYSDBA privilege granted.

D.

The user exceeded the value of PASSWORD_LIFE_TIME and Its password has not been reset yet

E.

The ACCOUNTS_ STATUS column is not updated until the user attempts to log in.

Question 10

Database Vault is configured and enabled in the database. You create a rule set to enforce security on the hr. employees table.

Examine these requirements:

1. Users working In hr department are allowed to view all rows In HR.EMPLOYEES.

2. hr managers are allowed to view, update, and delete data in In HR.EMPLOYEES.

3. Audit records are to be collected for every evaluation of the rule set.

Which two options are true when creating the rule set?

Options:

A.

One rule set contains two rules OR'ed together.

B.

The rule set parameter audit_options must be set to dbms_macutl.g_ruleset_audtt_fail.

C.

The rule set must be defined as is_static.

D.

The rule set parameter eval_options must be set to dbms_macutl.g_ruleset_eval_all.

E.

The rule set parameter audit_options must be set to dbms_macutl.g_buleset_audit_fail + DBMS MACUTL.G RULESET AUDIT SUCCESS.

Question 11

You export and Import a table's data using Data Pump connected as a user who Is assigned DBA role with default privileges.

There is a data redaction policy on the table.

Which two statements are true about the redaction policy?

Options:

A.

The actual data in the tables is copied to the Data Pump target system with the redaction policy applied.

B.

The policy Is not Included In export and Import operation.

C.

The actual data in the tables is copied to the Data Pump target system without being redacted.

D.

The policy Is Included In the export and Import operation but is not applied by default to the objects In the target system.

E.

The policy is included in the export and import operation and applied by default to the objects in the target system.

Question 12

Which statement is true about Network ACLs?

Options:

A.

They ate used to control access by users to external network services and resources from the database through PL/SQL.

B.

They are used to provide access to database packages.

C.

They are used to control the usage of UTL_TCP, ITL_HTTP, and UTL_INADDR.

D.

They are used to configure proxy for PL/SQL network utility packages.

Question 13

You must mask data consistently In three database copies such that data relations across the databases remain In place.

Which Data Masking Format allows this?

Options:

A.

Shuffle

B.

Auto Mask

C.

Array List

D.

Substitute

E.

Random Strings

Page: 1 / 3
Total 90 questions