Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Oracle 1z0-116 Dumps

Page: 1 / 9
Total 90 questions

Oracle Database Security Administration Questions and Answers

Question 1

An audit administrator wants to log Client Context variables In the audit trail.

Examine this query and the output:

as

Options:

A.

AUDIT CONTEXT NAMESPACE hr_Ct:x ATTRIBUTES hr_app_id NAMESPACE USERENV ATTRIBUTES ALL BY hr;

B.

AUDIT CONTEXT NAMESPACE hr_ctx ATTRIBUTES hr_app_id NAMESPACE USERENV ATTRIBUTES

current:_user( db_name BY hr;

C.

CREATE AUDIT POLICY hr_omp_pol ACTIONS UPDATE ON hr.employoes;

D.

AUDIT CONTEXT NAMESPACE hr_ctx ATTRIBUTES hr_app_id, current_user, db_name BY hr

E.

AUDIT POLICY hr_emp_pol BY hr;

F.

CREATE AUDIT POLICY hr_emp_pol ACTIONS SELECT ON hr. employees;

G.

AUDIT POLICY hr_emp_pol EXCEPT hr;

Question 2

Which type of attack attempts to find data by repeatedly trying similar SQL with a modified predicate?

Options:

A.

timing attack

B.

Inference attack

C.

data remanence attack

D.

cache attack

E.

side-channel attack

F.

known-plaintext attack

Question 3

Using Unified Audit, you must determine who performed an pkan backup ot recovery operations on a database.

You are connected as sysdba.

Which statement(s) achieve this?

A)

as

B)

as

C)

as

D)

as

E)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Question 4

Examine this list:

1. You must monitor access to email column or salary column In the employees table.

2. If any activity is detected, the action must be audited and a notification sent out by email.

3. The database has Unified Auditing enabled.

4. You have created and successfully tested the email sending procedure, sysadmin_fga.emaii._ai.ert.

You create the audit policy:

as

A user with select privilege on hr.employees executes this :

SELECT email FROM HR.EMPLOYEES;

What will be the result?

Options:

A.

The query will be executed, an entry will be created in the unified audit trail, and the mail will be sent.

B.

The query will be executed, an entry will be created In FGA_LOG$ table, and the mall will be sent.

C.

The query will be executed, but no audit entry will be created nor any mail sent.

D.

The query will be executed, no audit entry will be created but the mall will be sent.

Question 5

Which three are part of an access control list (ACL) when using Real Application Security?

Options:

A.

privileges

B.

schemas

C.

data realms

D.

column constraints

E.

policies

F.

data realm constraints

G.

roles

Question 6

Which four products, features, or methods can help facilitate compliance with various privacy-related regulatory requirements such as PCI-DSS and the EU GDPR?

Options:

A.

Data Redaction

B.

Data Guard

C.

Real Application Clusters

D.

Transparent Data Encryption

E.

Data Masking & Subsetting

F.

Table Partitioning

G.

Database Vault

Question 7

For which two reasons would you define Network ACLs?

Options:

A.

for configuring fine-grained access control for users and roles that need to access external network services from the database

B.

for configuring fine-grained access control to Oracle wallets to make HTTP requests that require password or client-certificate authentication

C.

to create auditing policies regarding the usage of network services from the database

D.

to block network attacks or denial of service attacks directed at the database

E.

to Improve the performance of the database applications that require access to remote network services

Question 8

The sqinet.oia file on the client contains this parameter setting:

SQLNET.ENCRYPTION_CLIEKT = REQUESTED

What value for the parameter sQLNET.ENCRYPTION _server In the sqlnet.ora file on the server will disable Encryption and Data Negotiation?

Options:

A.

REQUESTED

B.

ACCEPTED

C.

REQUIRED

D.

REJECTED

Question 9

You Issue this statement as user SYS:

audit, context namespace kilimanjaro attributes a, b;

Which is true?

Options:

A.

The statement will audit all users.

B.

The statement will not audit any users.

C.

The statement will only audit sys.

D.

The statement must be updated to specify which users to audit.

Question 10

You check the Risk Matrix of the latest Critical Patch Update (CPU).

One of the " Common Vulnerability and Exposure’’ reports (CVEs) has Base Score that is above 9 in the Risk Matrix.

Which one is not a supported method to address this CVE?

Options:

A.

Request a one off patch exception from Oracle Support.

B.

Implement a workaround recommended by Oracle Support.

C.

Upgrade to a new Release.

D.

Install a new Release Update.

E.

Install a new Release Update Revision.

Question 11

Examine this code which executes successfully:

as

If the IN_OFFICE_ON_WEEKEND rule set returns true for an attempt to connect from Inside the office on weekends, which two are true about the effects of this configuration?

Options:

A.

JIM con never connect.

B.

This has no effect on tom's connect attempts.

C.

TOM can never connect.

D.

JIM can only connect when In the office on weekends.

E.

This has no effect on JIM'S connection attempts.

Question 12

You are the Service Consumer In the Cloud Shared Responsibility Model.

Which three are your responsibility when using the Infrastructure as a Service (IaaS)?

Options:

A.

application

B.

host Infrastructure

C.

network

D.

data

E.

physical

F.

guest OS

G.

virtualization

Question 13

Examine this sqlnet.ora file used by a client application:

as

Which three are found in the wallet specified by the directory parameter?

Options:

A.

the private key of the database service

B.

the trusted certificates of the database service

C.

the user certificate used to uniquely Identify the database service

D.

the private key of the client application

E.

the username, password, and service name required to connect to the database

F.

the user certificate used to uniquely Identify the client application

G.

the trusted certificates of the Certification Authority

Page: 1 / 9
Total 90 questions