Questions for the 1Z0-116 were updated on : Nov 26 ,2024
Page 1 out of 6. Viewing questions 1-15 out of 90
Question 1
What does the Application Data Modeling module of the Oracle Data Masking and Subsetting Pack search for?
A. data redaction policies
B. data masking transformations
C. parent/child relationships between the columns holding sensitive information
D. encrypted columns
Answer:
C
User Votes:
A
50%
B 1 votes
50%
C 1 votes
50%
D
50%
Explanation: Create an Application Data Model To begin using Oracle Data Masking and Subsetting, you must create an Application Data Model (ADM). ADMscapture application metadata, referential relationships, and discover sensitive data from the source database. https://docs.oracle.com/database/121/DMKSB/intro.htm#:~:text=Create%20an%20Application%20 Data%20Model,data%20from%20the%20source%20database .
Discussions
0/ 1000
Question 2
Database Vault is configured and enabled in the database. You create a rule set to enforce security on the hr. employees table. Examine these requirements: 1. Users working In hr department are allowed to view all rows In HR.EMPLOYEES. 2. hr managers are allowed to view, update, and delete data in In HR.EMPLOYEES. 3. Audit records are to be collected for every evaluation of the rule set. Which two options are true when creating the rule set?
A. One rule set contains two rules OR'ed together.
B. The rule set parameter audit_options must be set to dbms_macutl.g_ruleset_audtt_fail.
C. The rule set must be defined as is_static.
D. The rule set parameter eval_options must be set to dbms_macutl.g_ruleset_eval_all.
E. The rule set parameter audit_options must be set to dbms_macutl.g_buleset_audit_fail + DBMS MACUTL.G RULESET AUDIT SUCCESS.
Answer:
CD
User Votes:
A
50%
B 1 votes
50%
C
50%
D 1 votes
50%
E
50%
Discussions
0/ 1000
Question 3
To avoid hard coding passwords in scripts, you have elected to create an external password store- Examine this list of steps: 1. Set the external password store wallet location. ALTER SYSTEM SET EXTERNAL_KEYSTORE_CREDENTIAL_LOCATION = "/tc/ORACLE/WALLETS/orcl/external_Btore" SCOPE c SPFILE; 2. Log in as a user who has syskm privileges. 3. Create an auto-logln keystore that contains the keystore password including the add secret clause. ADMINISTER KEY MANAGEMENT ADD SECRET 'password' FOR CLIENT 'TDE_WALLET' TO LOCAL AUTO_LOGIH KEYSTORE '/etc/0RACLE/WALLETS/orcl/extemal_store'; 4. Restart the database instance as sysdba. SHUTDOWN IMMEDIATE STARTUP 5. Create an auto-logln keystore that contains the keystore password. ADMINISTER KEY MANAGEMENT FOR CLIENT 'TDE_WALLET' TO LOCAL AUTO_L0GIN KEYSTORE ' /etc/ORACLE/WALLETS/orcl/external_store' ; 6. Set an Encryption Key. ADMINISTER KEY MANAGEMENT SET ENCRYPTION KEY IDENTIFIED BY keystore_password WITH BACKUP Identify the minimum number of steps in the correct order that must be performed to create the external password store.
A. 2,1,3,4
B. 1,2,5,4
C. 1,2,3,6,4
D. 1,2,6,3,5
E. 2,3,6,4
F. 1,2,3,4
Answer:
D
User Votes:
A 1 votes
50%
B
50%
C
50%
D
50%
E
50%
F
50%
Discussions
0/ 1000
Question 4
Oracle Database Vault is enabled In the database. You have these requirements: 1. Database administrator dbai must export and import data from and to a non-protected schema. 2. Database administrator dba2 must export and Import data from and to a protected schema. Which three options together satisfy these requirements?
A. Grant become user to dbai.
B. Grant sysoper to both users.
C. Run d3ms_macadm.authorize_datapump_user procedure granting dbai privileges to impdp and expdp utilities.
D. Grant imp_full_database and exp_full_database to dbai and dba2.
E. Run dbms_macadm.authobize_datapump_useb procedure granting dba2 privileges to impdp and expdp utilities.
F. Grant become user to dba2.
G. Grant sysdba to both users.
Answer:
ACE
User Votes:
A 1 votes
50%
B
50%
C 1 votes
50%
D 1 votes
50%
E
50%
F
50%
G
50%
Discussions
0/ 1000
Question 5
You must restrict execution of the alter system checkpoint command to certain conditions, specified in a rule set used by a command rule. Which two parameters must be specified In the dbms_macadm.create_command_rule procedure to do this?
A. PARAMETER_NAM£=>'CHECKPOINT'
B. OBJECT_OWNER=>'SYS
C. CLAUSE_NAME=>'CHECKPOINT'
D. CLAUSE_NAME=>'SYSTEM'
E. COMMANI>=>' ALTER SYSTEM'
F. OBJECT_NAME=>'CHECKPOINT'
G. COMMAND=>'ALTER'
Answer:
CD
User Votes:
A
50%
B
50%
C 2 votes
50%
D
50%
E 2 votes
50%
F
50%
G
50%
Discussions
0/ 1000
Question 6
If a column is not specified in a Data Redaction Policy, to which column(s) is it applied?
A. none of the columns
B. foreign key columns only
C. the primary and foreign key columns
D. columns with any type of constraint
E. the primary key column only
Answer:
C
User Votes:
A 2 votes
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 7
Which three are part of an access control list (ACL) when using Real Application Security?
A. privileges
B. schemas
C. data realms
D. column constraints
E. policies
F. data realm constraints
G. roles
Answer:
ADF
User Votes:
A 2 votes
50%
B
50%
C
50%
D 2 votes
50%
E
50%
F 2 votes
50%
G
50%
Discussions
0/ 1000
econdeal
8 months, 1 week ago
In summary, the application user who logs in will only be allowed to perform operations including DML on records within the data realm, including individual rows of data, based on the application privileges in its associated ACLs. Thus, the data security policy is composed of data realm constraints and column constraints that protect the data realm by only allowing access to application users who have application privileges in the associated ACLs.
Question 8
Using Unified Audit, you must determine who performed an pkan backup ot recovery operations on a database. You are connected as sysdba. Which statement(s) achieve this? A)
B)
C)
D)
E)
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
Answer:
A
User Votes:
A
50%
B 2 votes
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 9
When creating labels using Oracle Label Security, which is required?
A. level and group
B. level, compartment, and group
C. compartment
D. group
E. level
F. compartment and group
G. level and compartment
Answer:
E
User Votes:
A
50%
B
50%
C
50%
D
50%
E 2 votes
50%
F
50%
G
50%
Discussions
0/ 1000
Question 10
Examine this command : GRANT EXEMPT ACCESS POLICY TO PUBLIC; Which Transparent Sensitive Data Protection functionality will be affected when this command is executed?
A. Data Redaction
B. Bind Masking
C. Virtual Private Database
D. Transparent Data Encryption
Answer:
D
User Votes:
A
50%
B
50%
C 2 votes
50%
D
50%
Discussions
0/ 1000
Question 11
Database Vault is not used in your installation. Why is a conventional secure application role more secure than a normal role?
A. It Is In effect only when configured as a default role for the user.
B. It requires a password to be set.
C. It can be set only by a package or procedure that is created with deflner's rights.
D. It can be set only by users with the grant any bole privilege.
E. It can be set only by a package or procedure associated with the role definition.
Answer:
D
User Votes:
A
50%
B
50%
C 1 votes
50%
D
50%
E 2 votes
50%
Discussions
0/ 1000
Question 12
The listener configuration contains these lines related to Valid Node Checking for Registration (VNCR);
Which two statements are true?
A. Both parameters cannot be set at the same time so will be Ignored.
B. Listener listener will allow instance registration from IP address 192.168.20.2.
C. Listener listener will allow Instance registration from REGISTRATION_INVITED_NODES_LISTENEP.
D. Listener listener will only deny instance registration from REGISTRATION EXCLUDED NODES LISTENER.
E. Listener listener will deny instance registration from IP address 192.168.20.2.
Answer:
C
User Votes:
A
50%
B 2 votes
50%
C 2 votes
50%
D
50%
E
50%
Discussions
0/ 1000
econdeal
8 months, 1 week ago
b anc c... Just as in validnode checking, both invited/excluded cannot be specified together. If they are, invited nodes take precedence.
Question 13
Which statement is true about Network ACLs?
A. They ate used to control access by users to external network services and resources from the database through PL/SQL.
B. They are used to provide access to database packages.
C. They are used to control the usage of UTL_TCP, ITL_HTTP, and UTL_INADDR.
D. They are used to configure proxy for PL/SQL network utility packages.
Answer:
D
User Votes:
A 2 votes
50%
B
50%
C
50%
D
50%
Explanation: TheNETWORK_ACL_ADMINpackage provides the interface to administer the network access control lists (ACL). ACLs are used to control access by users to external network services and resources from the database through PL/SQL network utility packages including UTL_TCP , UTL_HTTP , UTL_SMTP and UTL_INADDR . https://docs.oracle.com/database/121/ARPLS/d_networkacl_adm.htm#ARPLS74568
Discussions
0/ 1000
Question 14
You must disable OS authentication for database administrative users on a RAC database. Which option must you use to do this?
A. Set sqlnet.aothentication_sebvices=(NONe» In sqlnet.ora on the database server.
B. Remove all OS users from OS groups: osdba, osoper, osbackupdba, osdgdba, osrmdba, OSASMADMIN, OSASMDBA.
C. Set REMOTE_LOGIH_PASSWORDFILE = EXCLUSIVE In the init.ora file.
D. Set REMOTE_OS_AUTHENT = FALSE In the init.ora file.
Answer:
D
User Votes:
A 1 votes
50%
B
50%
C
50%
D 1 votes
50%
Discussions
0/ 1000
Question 15
Which type of attack attempts to find data by repeatedly trying similar SQL with a modified predicate?