Pass the Oracle Oracle Database Security 1z0-116 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

You Issue this statement as user SYS:

audit, context namespace kilimanjaro attributes a, b;

Which is true?

Options:

A.

The statement will audit all users.


B.

The statement will not audit any users.


C.

The statement will only audit sys.


D.

The statement must be updated to specify which users to audit.


Questions # 22:

You develop an HR application that must allow multiple sessions to share application attributes. Which statement is executed while implementing the requirement?

Options:

A.

CREATE CONTEXT global_hr USING hr_pkg;


B.

CREATE CONTEXT global_hr USING hr_pkg ACCESSED GLOBALLY;


C.

CREATE CONTEXT global_hr USING hr_pkg INITIALIZED GLOBALLY;


D.

CREATE CONTEXT global_hr USING hr_pkg INITIALIZED EXTERNALLY;


Questions # 23:

Which type of attack attempts to find data by repeatedly trying similar SQL with a modified predicate?

Options:

A.

timing attack


B.

Inference attack


C.

data remanence attack


D.

cache attack


E.

side-channel attack


F.

known-plaintext attack


Questions # 24:

You are connected to an Oracle database Instance as a user with privileges to query the hr.employees table.

You are not exempt from any reduction policies.

Examine this query and result:

Question # 24

You implement this Data Redaction policy:

Question # 24

You re-execute the select statement.

What is the result?

A)

Question # 24

B)

Question # 24

C)

Question # 24

D)

Question # 24

E)

Question # 24

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


E.

Option E


Questions # 25:

Examine this code which executes successfully:

Question # 25

If the IN_OFFICE_ON_WEEKEND rule set returns true for an attempt to connect from Inside the office on weekends, which two are true about the effects of this configuration?

Options:

A.

JIM con never connect.


B.

This has no effect on tom's connect attempts.


C.

TOM can never connect.


D.

JIM can only connect when In the office on weekends.


E.

This has no effect on JIM'S connection attempts.


Questions # 26:

Examine this sqlnet.ora file used by a client application:

Question # 26

Which three are found in the wallet specified by the directory parameter?

Options:

A.

the private key of the database service


B.

the trusted certificates of the database service


C.

the user certificate used to uniquely Identify the database service


D.

the private key of the client application


E.

the username, password, and service name required to connect to the database


F.

the user certificate used to uniquely Identify the client application


G.

the trusted certificates of the Certification Authority


Questions # 27:

Database Vault realm r protects all tables In the fin schema from DBA access User fin is configured as the owner in realm R.

You must also prevent access to realm r protected tables by user FIN. Which achieves this?

Options:

A.

Revoke the select any table privilege from user FIN.


B.

Make realm R a mandatory realm.


C.

Remove the owner authorization of user fin in realm R.


D.

Make user FIN participant In realm r. Instead of owner.


Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions