Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Oracle 1z0-116 Oracle Database Security Administration Exam Practice Test

Page: 1 / 9
Total 90 questions

Oracle Database Security Administration Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

As an Autonomous Transaction Processing (ATP) database administrator, you want to extend the storage capacity In the database.

Examine this command and output from the database:

What is the reason for the error?

Options:

A.

The storage quota has been reached for the ATP database.

B.

The create TABLESAPECE statement is not available in ATP.

C.

There is not enough storage available in the ATP database.

D.

You must be explicitly granted the create TABLESPACE privilege in ATP.

E.

Database Vault prevents you from executing this command.

Question 2

What does the Application Data Modeling module of the Oracle Data Masking and Subsetting Pack search for?

Options:

A.

data redaction policies

B.

data masking transformations

C.

parent/child relationships between the columns holding sensitive information

D.

encrypted columns

Question 3

To avoid hard coding passwords in scripts, you have elected to create an external password store-Examine this list of steps:

1. Set the external password store wallet location.

ALTER SYSTEM SET EXTERNAL_KEYSTORE_CREDENTIAL_LOCATION = "/•tc/ORACLE/WALLETS/orcl/external_Btore" SCOPE c SPFILE;

2. Log in as a user who has syskm privileges.

3. Create an auto-logln keystore that contains the keystore password including the add secret clause.

ADMINISTER KEY MANAGEMENT ADD SECRET 'password'

FOR CLIENT 'TDE_WALLET'

TO LOCAL AUTO_LOGIH KEYSTORE '/etc/0RACLE/WALLETS/orcl/extemal_store';

4. Restart the database instance as sysdba.

SHUTDOWN IMMEDIATE STARTUP

5. Create an auto-logln keystore that contains the keystore password.

ADMINISTER KEY MANAGEMENT

FOR CLIENT 'TDE_WALLET'

TO LOCAL AUTO_L0GIN KEYSTORE ' /etc/ORACLE/WALLETS/orcl/external_store' ;

6. Set an Encryption Key.

ADMINISTER KEY MANAGEMENT SET ENCRYPTION KEY IDENTIFIED BY keystore_password WITH BACKUP

Identify the minimum number of steps in the correct order that must be performed to create the external password store.

Options:

A.

2,1,3,4

B.

1,2,5,4

C.

1,2,3,6,4

D.

1,2,6,3,5

E.

2,3,6,4

F.

1,2,3,4

Question 4

Examine this statement and its result:

You issue this statement and then restart the database instance:

Which Is true about generated audit records?

Options:

A.

They now Include all application context attribute values.

B.

They are now written to XML files as well as the database.

C.

They now Include SQL statements and any bind variables.

D.

Information is now populated in auds .commentstext.

Question 5

Examine these commands and the output used to configure Real Application Security:

What does this output mean?

Options:

A.

You treated an access control list that references a non-existent policy.

B.

You created an access control list that references a non-existent realm.

C.

You created a policy that references a non-existent access control list.

D.

You created a realm and an access control list that reference a non-existent policy.

E.

You created a policy that references a non-existent realm.

F.

You created a realm that references a non-existent policy.

Question 6

Which statement can be used to force password complexity in the password file?

Options:

A.

orapwd file=orapwORCL format=12 force-yes

B.

orapwd file=orapwORCL force=yes format=legacy

C.

orapwd file=orapwOPCL forcaat=12

D.

orapwd file=orapwOBCL forroat=12.2

Question 7

Which two configurations can be used to protect sensitive data In a database?

Options:

A.

setting the SQL92_SECURITy initialization parameter to false

B.

enabling salt tor an encrypted column

C.

creating a procedure that defines the VPD restrictions in a VPD policy

D.

collecting sensitive data Information with Database Security Assessment Tool (DBSAT)

E.

enforcing row-level security at the table level

F.

enforcing row-level security at the database level

Question 8

Which three authentication methods are available with Centrally Managed Users (CMU)?

Options:

A.

remote Access Services authentication

B.

smart key authentication

C.

public key Infrastructure (PKT) authentication

D.

kerberos authentication

E.

username/password authentication

F.

SSH authentication

Question 9

Examine this command that Is executed:

What is the result?

Options:

A.

The salary column is fine grain audited.

B.

The salary column is nullified when queried by the database users.

C.

The bind variables for the salary column are masked In trace files and vS views.

D.

The salary column is encrypted using TDE column encryption.

E.

The salary column is redacted when queried by database users.

Question 10

Using Unified Audit, you must determine who performed an pkan backup ot recovery operations on a database.

You are connected as sysdba.

Which statement(s) achieve this?

A)

B)

C)

D)

E)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Question 11

You must rekey encrypted sensitive credential data In your database.

You run the command alter database dictionary rekey credentials.

Which three options ate true about the bkkey process?

Options:

A.

Credential Data Is automatically encrypted using aes2S6.

B.

The credential data encryption process does not de-obfuscate the obfuscated passwords before re-encrypts begin.

C.

Both sys. links and sys . SCHEDULER_CREDENTIAL tables are rekeyed.

D.

The rekey process prompts the user to provide a new key algorithm If needed.

E.

The process of rekeylng does not automatically open the keystore.

F.

The rekey process only applies to the sys.ltnks CREDENTUIALS table.

G.

The rekey process only applies to the SYS.SCHEDULES$ credential table.

Question 12

You are required to remove embedded passwords from scripts that connect to database instances. Which tool can be used to implement this requirement?

Options:

A.

orapki

B.

netca

C.

dbca

D.

netmgr

E.

mkstore

F.

owm

Question 13

Database Vault realm r protects all tables In the fin schema from DBA access User fin is configured as the owner in realm R.

You must also prevent access to realm r protected tables by user FIN. Which achieves this?

Options:

A.

Revoke the select any table privilege from user FIN.

B.

Make realm R a mandatory realm.

C.

Remove the owner authorization of user fin in realm R.

D.

Make user FIN participant In realm r. Instead of owner.

Page: 1 / 9
Total 90 questions