If a column is not specified in a Data Redaction Policy, to which column(s) is it applied?
Examine these statements which execute successfully:
Which are the two reasons that no rows Are returned from the query?
Which two tasks should you perform initially to Implement native network encryption without disrupting client applications?
Database Vault Is configured and enabled In the Oracle database.
Three users are granted the dba, dv_omneb, and dv_acctmgb roles.
There is a requirement to create a user who can:
1. Connect to the database Instance
2. Select from dictionary views
Which users can complete the operation to meet the requirement?
Examine this list of capabilities:
1. You can automatically restrict common users from accessing pluggable database (PDB).
2. Enabling Database Vault Operations Control In cdbsroot does not automatically enable It In PDBs.
3. Any common user granted the dv_admin role can enable Database Vault Operations Control.
4. To enable Database Vault Operations Control, use the dbms_macadm.enable_app_protection.
5. Common users' and Invokers' right procedures that must access PDB local data can be added to an exception list.
6. To disable Database Vault Operations Control, use the dbms_macadm.disable_app_protection.
Which statements describe Database Vault Operations Control?
Examine these commands and responses:
Which object privilege must be granted to allow execution of the stored procedure?
You check the Risk Matrix of the latest Critical Patch Update (CPU).
One of the " Common Vulnerability and Exposure’’ reports (CVEs) has Base Score that is above 9 in the Risk Matrix.
Which one is not a supported method to address this CVE?
Examine this list:
1. You must monitor access to email column or salary column In the employees table.
2. If any activity is detected, the action must be audited and a notification sent out by email.
3. The database has Unified Auditing enabled.
4. You have created and successfully tested the email sending procedure, sysadmin_fga.emaii._ai.ert.
You create the audit policy:
A user with select privilege on hr.employees executes this :
SELECT email FROM HR.EMPLOYEES;
What will be the result?
You develop an HR application that must allow multiple sessions to share application attributes. Which statement is executed while implementing the requirement?
Oracle Database Vault is enabled In the database. You have these requirements:
1. Database administrator dbai must export and import data from and to a non-protected schema.
2. Database administrator dba2 must export and Import data from and to a protected schema.
Which three options together satisfy these requirements?
You are Implementing a security policy that makes use of the USERENV namespace.
Which USERRENV value does not change for the duration of a session?
Database user SCOTT requires the privilege to select from all tables and you decide to configure this using a global role.
You have not yet configured the database with Enterprise User Security.
You plan to perform these steps:
1. create role GLOBAI._ROI.E identified globally;
2. grant select any table to GLODAL_COLE;
3. grant GLOBAL_ROLE to SCOTT;
What is the result?
User jane must report on who has done RMAN backups on a database that has Unified Auditing enabled.
What is the minimum that must be done to allow JANE to generate these reports?
Which CVSS Version 3.1 metric indicates how close an attacker needs to be to the vulnerable component?
Which two represent the set of users that are never affected by connect command rules?