Winter Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Oracle 1z0-116 Oracle Database Security Administration Exam Practice Test

Page: 1 / 9
Total 90 questions

Oracle Database Security Administration Questions and Answers

Question 1

Examine this command:

Question # 1

Which two statements are true?

Options:

A.

Opening the software keystore from remote computers is possible.

B.

Opening the software keystore from the local computer Is possible.

C.

Opening the software keystore from remote computers is not possible.

D.

Opening the software keystore must always be done manually on the local computer.

E.

Opening the software keystore from the local computer is not possible.

Question 2

As the SYSKM user you must create the password-based keystore, which will be used for TDE. Examine this list:

Question # 2

Identify the sequence that Oracle uses to search for the keystore and its location.

Options:

A.

3,5,2,4,1

B.

1,4,5,2

C.

1,2,5,4

D.

1,2,3,5

Question 3

When creating labels using Oracle Label Security, which is required?

Options:

A.

level and group

B.

level, compartment, and group

C.

compartment

D.

group

E.

level

F.

compartment and group

G.

level and compartment

Question 4

Examine this command:

Question # 4

What masking definitions does it list?

Options:

A.

All with the name credit and the commands to deploy them on all databases with names starting with test.

B.

All with names starting with credit and created on databases with names starting with test.

C.

All with the name credit and created on databases with name starting with teat.

D.

All with names starting with credit and created on any database.

E.

All with the name credit and the commands to deploy them on a database with the name test.

Question 5

Which statement is true about Network ACLs?

Options:

A.

They ate used to control access by users to external network services and resources from the database through PL/SQL.

B.

They are used to provide access to database packages.

C.

They are used to control the usage of UTL_TCP, ITL_HTTP, and UTL_INADDR.

D.

They are used to configure proxy for PL/SQL network utility packages.

Question 6

You are the Service Consumer In the Cloud Shared Responsibility Model.

Which three are your responsibility when using the Infrastructure as a Service (IaaS)?

Options:

A.

application

B.

host Infrastructure

C.

network

D.

data

E.

physical

F.

guest OS

G.

virtualization

Question 7

Which CVSS Version 3.1 metric indicates how close an attacker needs to be to the vulnerable component?

Options:

A.

Privileges Required

B.

User Interaction

C.

Attack Vector

D.

Scope

E.

Availability

F.

Attack Complexity

Question 8

Which two represent the set of users that are never affected by connect command rules?

Options:

A.

SYS

B.

users with the DV_ACCTMGR role

C.

users with the DV_OWNER role

D.

users with the DV_ADMIN role

E.

SYSTEM

Question 9

Examine these commands and responses:

Question # 9

Which object privilege must be granted to allow execution of the stored procedure?

Options:

A.

grant EXECUTE ON MARY.PBOC2 Co U1;

B.

grant INHERIT PRIVILEGES ON USER U1 TO MARY;

C.

grant INHERIT PRIVILEGES ON USER MARY TO Ul ;

D.

grant EXECUTE ON Ul.PROC2 TO MARY;

Question 10

A database link must be created to connect a source Autonomous Database to target on premises database.

Examine this command:

Question # 10

Which two options are true?

Options:

A.

The target database wallet can be uploaded to the data_pctmp_dtr directory.

B.

The db_link_cred parameter stores the password in a wallet.

C.

The db__link__cred references the credential for the username and password for the target database.

D.

The credential_nam£ parameter automatically creates the credential object store.

E.

The database link port Is not correct because It must be restricted to 1521.

F.

Only data_pump_dir directory can be used to store credential wallets.

Question 11

Which two statements are true about running the Oracle Database Security Assessment Tool (DBSAT) Collector?

Options:

A.

It runs only on UNIX/Linux systems.

B.

It must connect to the database using a SYSDBA connection.

C.

It must be run by an OS user with read permissions on files and directories under ORACLE_HOME.

D.

It runs only on Windows systems.

E.

It must be run on the server that contains the database.

Question 12

Examine this statement and its result:

Question # 12

You issue this statement and then restart the database instance:

Question # 12

Which Is true about generated audit records?

Options:

A.

They now Include all application context attribute values.

B.

They are now written to XML files as well as the database.

C.

They now Include SQL statements and any bind variables.

D.

Information is now populated in auds .commentstext.

Question 13

Examine this parameter In sqinet.ora:

SQLNET.ADTHENTICATION_SEBVICES=(NONE)

For which two cases do you need a password file?

Options:

A.

to authenticate externally Identified users locally

B.

to authenticate nonprivllegcd database users locally

C.

to authenticate administrative privileged users remotely

D.

to authenticate externally Identified users remotely

E.

to authenticate nonprivileged database users remotely

F.

to authenticate administrative privileged users locally

Page: 1 / 9
Total 90 questions