Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

1z0-116 Oracle Database Security Administration Questions and Answers

Questions 4

You configured Kerberos authentication for databases running on servers A and B.

However a database link connecting the database on server A to the database on server B fails with ORA-12638 Credential retrieval failed.

Where must you make a change to sqlnet.ora to allow the database link to use its stored credentials Instead of trying to use Kerberos?

Options:

A.

on client side of server B

B.

on client side of server A

C.

on server side of server B

D.

on server side of server A

Buy Now
Questions 5

Which two configurations can be used to protect sensitive data In a database?

Options:

A.

setting the SQL92_SECURITy initialization parameter to false

B.

enabling salt tor an encrypted column

C.

creating a procedure that defines the VPD restrictions in a VPD policy

D.

collecting sensitive data Information with Database Security Assessment Tool (DBSAT)

E.

enforcing row-level security at the table level

F.

enforcing row-level security at the database level

Buy Now
Questions 6

Which statement is true about Network ACLs?

Options:

A.

They ate used to control access by users to external network services and resources from the database through PL/SQL.

B.

They are used to provide access to database packages.

C.

They are used to control the usage of UTL_TCP, ITL_HTTP, and UTL_INADDR.

D.

They are used to configure proxy for PL/SQL network utility packages.

Buy Now
Questions 7

Database Vault realm r protects all tables In the fin schema from DBA access User fin is configured as the owner in realm R.

You must also prevent access to realm r protected tables by user FIN. Which achieves this?

Options:

A.

Revoke the select any table privilege from user FIN.

B.

Make realm R a mandatory realm.

C.

Remove the owner authorization of user fin in realm R.

D.

Make user FIN participant In realm r. Instead of owner.

Buy Now
Questions 8

You are Implementing a security policy that makes use of the USERENV namespace.

Which USERRENV value does not change for the duration of a session?

Options:

A.

SESSION_CSER

B.

CURRENT_OSER

C.

CURRENT SCHEMA

D.

CLIENT_INFO

Buy Now
Questions 9

Which two privileges can be restricted at the column level?

Options:

A.

SELECT

B.

INSERT

C.

REVOKE

D.

UPDATE

E.

GRANT

F.

DELETE

Buy Now
Questions 10

Examine this output:

Which three are true?

Options:

A.

John must connect as system to perform backup and recovery operations.

B.

John can query dba tables.

C.

John can perform backup and recovery operations by using SQL.

D.

John can perform backup and recovery operations by using RMAN.

E.

John must connect as sys to perform backup and recovery operations.

F.

John Is not able to perform startup and shutdown operations.

G.

John can query other user's data.

Buy Now
Questions 11

Examine this sqlnet.ora file used by a client application:

Which three are found in the wallet specified by the directory parameter?

Options:

A.

the private key of the database service

B.

the trusted certificates of the database service

C.

the user certificate used to uniquely Identify the database service

D.

the private key of the client application

E.

the username, password, and service name required to connect to the database

F.

the user certificate used to uniquely Identify the client application

G.

the trusted certificates of the Certification Authority

Buy Now
Questions 12

Which two are true about Database Privilege Analysis?

Options:

A.

It can be used after you install the Oracle Database without any additional database configuration steps.

B.

It must have the Database Vault option enabled.

C.

Privilege analysis data for dropped objects are kept.

D.

If a privilege is captured during run time, it is saved under the run-time capture name.

E.

It shows the grant paths to the privileges and suggests which grant path to keep.

F.

It cannot be used to capture the privileges that have been exercised on precompiled database objects.

Buy Now
Questions 13

Which three are part of an access control list (ACL) when using Real Application Security?

Options:

A.

privileges

B.

schemas

C.

data realms

D.

column constraints

E.

policies

F.

data realm constraints

G.

roles

Buy Now
Exam Code: 1z0-116
Exam Name: Oracle Database Security Administration
Last Update: Nov 21, 2024
Questions: 90

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90