Pass the Oracle Oracle Database Security 1z0-116 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

When creating labels using Oracle Label Security, which is required?

Options:

A.

level and group


B.

level, compartment, and group


C.

compartment


D.

group


E.

level


F.

compartment and group


G.

level and compartment


Questions # 2:

To avoid hard coding passwords in scripts, you have elected to create an external password store-Examine this list of steps:

1. Set the external password store wallet location.

ALTER SYSTEM SET EXTERNAL_KEYSTORE_CREDENTIAL_LOCATION = "/•tc/ORACLE/WALLETS/orcl/external_Btore" SCOPE c SPFILE;

2. Log in as a user who has syskm privileges.

3. Create an auto-logln keystore that contains the keystore password including the add secret clause.

ADMINISTER KEY MANAGEMENT ADD SECRET 'password'

FOR CLIENT 'TDE_WALLET'

TO LOCAL AUTO_LOGIH KEYSTORE '/etc/0RACLE/WALLETS/orcl/extemal_store';

4. Restart the database instance as sysdba.

SHUTDOWN IMMEDIATE STARTUP

5. Create an auto-logln keystore that contains the keystore password.

ADMINISTER KEY MANAGEMENT

FOR CLIENT 'TDE_WALLET'

TO LOCAL AUTO_L0GIN KEYSTORE ' /etc/ORACLE/WALLETS/orcl/external_store' ;

6. Set an Encryption Key.

ADMINISTER KEY MANAGEMENT SET ENCRYPTION KEY IDENTIFIED BY keystore_password WITH BACKUP

Identify the minimum number of steps in the correct order that must be performed to create the external password store.

Options:

A.

2,1,3,4


B.

1,2,5,4


C.

1,2,3,6,4


D.

1,2,6,3,5


E.

2,3,6,4


F.

1,2,3,4


Questions # 3:

What Is the first step when analyzing security within a database?

Options:

A.

Encrypt tablespaces using Transparent Data Encryption


B.

Configure and enable Database Vault


C.

Execute Database Security Assessment Tool (DBSAT)


D.

Mask nonproduction data using Data Masking & Subsetting


E.

Deploy Oracle Key Vault


F.

Create a Data Redaction Policy for your most sensitive tables


Questions # 4:

Which two statements are true about Database Vault factors?

Options:

A.

A factor can reference a function In another schema to compute its value, provided execute privilege Is granted to the sys user.


B.

Changing a factor type can change how factors are evaluated.


C.

You can configure a factor to be evaluated only once per session.


D.

You get an error at the time of factor creation If the retrieval method function you have specified does not exist.


E.

You can use a factor to enforce conditions for a command rule.


Questions # 5:

A policy predicate function Is associated with an enabled Virtual Private Database (VPD) policy for a table.

Which two arguments are passed to the function?

Options:

A.

the table name


B.

the schema owning the table


C.

the policy type


D.

the policy name


E.

the policy group to which the policy belongs


Questions # 6:

Examine this output:

Question # 6

Which three are true?

Options:

A.

John must connect as system to perform backup and recovery operations.


B.

John can query dba tables.


C.

John can perform backup and recovery operations by using SQL.


D.

John can perform backup and recovery operations by using RMAN.


E.

John must connect as sys to perform backup and recovery operations.


F.

John Is not able to perform startup and shutdown operations.


G.

John can query other user's data.


Questions # 7:

You must disable OS authentication for database administrative users on a RAC database.

Which option must you use to do this?

Options:

A.

Set sqlnet.aothentication_sebvices=(NONe» In sqlnet.ora on the database server.


B.

Remove all OS users from OS groups: osdba, osoper, osbackupdba, osdgdba, osrmdba, OSASMADMIN, OSASMDBA.


C.

Set REMOTE_LOGIH_PASSWORDFILE = EXCLUSIVE In the init.ora file.


D.

Set REMOTE_OS_AUTHENT = FALSE In the init.ora file.


Questions # 8:

You export and Import a table's data using Data Pump connected as a user who Is assigned DBA role with default privileges.

There is a data redaction policy on the table.

Which two statements are true about the redaction policy?

Options:

A.

The actual data in the tables is copied to the Data Pump target system with the redaction policy applied.


B.

The policy Is not Included In export and Import operation.


C.

The actual data in the tables is copied to the Data Pump target system without being redacted.


D.

The policy Is Included In the export and Import operation but is not applied by default to the objects In the target system.


E.

The policy is included in the export and import operation and applied by default to the objects in the target system.


Questions # 9:

Using Unified Audit, you must determine who performed an pkan backup ot recovery operations on a database.

You are connected as sysdba.

Which statement(s) achieve this?

A)

Question # 9

B)

Question # 9

C)

Question # 9

D)

Question # 9

E)

Question # 9

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


E.

Option E


Questions # 10:

For which two reasons would you define Network ACLs?

Options:

A.

for configuring fine-grained access control for users and roles that need to access external network services from the database


B.

for configuring fine-grained access control to Oracle wallets to make HTTP requests that require password or client-certificate authentication


C.

to create auditing policies regarding the usage of network services from the database


D.

to block network attacks or denial of service attacks directed at the database


E.

to Improve the performance of the database applications that require access to remote network services


Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions