Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

1z0-116 Sample Questions Answers

Questions 4

If a column is not specified in a Data Redaction Policy, to which column(s) is it applied?

Options:

A.

none of the columns

B.

foreign key columns only

C.

the primary and foreign key columns

D.

columns with any type of constraint

E.

the primary key column only

Buy Now
Questions 5

Examine these statements which execute successfully:

Which are the two reasons that no rows Are returned from the query?

Options:

A.

Only DBA users can query SESSION_CONTEXT view contents.

B.

An administrator issues the ALTER SYSTEM FLUSH global context statement.

C.

The set_empno_crx_proc procedure must be in a package.

D.

The application context is global.

E.

Enterprise User Security is not configured and used for the user.

Buy Now
Questions 6

Which two are true about auditing in an Oracle Database?

Options:

A.

SYS logon operations are always audited In unified auditing.

B.

All SYS operations are audited by default in unified auditing.

C.

No SYS operations are audited by default In unified auditing.

D.

SYS logon operations are always audited in mixed mode auditing.

E.

No SYS operations are audited if audit_sys_operations is set on false in unified auditing.

F.

No SYS operations are audited if audit_sys_operations is set on false in mixed mode auditing.

Buy Now
Questions 7

You grant user JANE the SYSDBA administrative privilege. Which two are true?

Options:

A.

User JANE must always connect as SYSDBA to the database instance.

B.

User JANE can grant SYSDBA privilege to roles.

C.

User JANE must use operating system authentication.

D.

User JANE can create objects In sys schema only when connected as SYSDBA.

E.

User JANE acquires the DBA role by default.

F.

User JANE can backup and recover the database.

Buy Now
Questions 8

Which two tasks should you perform initially to Implement native network encryption without disrupting client applications?

Options:

A.

Upgrade all OCI-basod clients to match the database version.

B.

Set the server side sqinet.oia parameter sqlnet.encryption_server = requested.

C.

Configure the listener with an endpoint for protocol TCPS.

D.

Verify which clients have encrypted connections using the view vSsession_CONNECT_INFO.

E.

Set the client side sqinec.ora parameter SQLNET.ENCRYPTION _client = required.

F.

Set the server side sqinot.ora parameter SQLNET.CRYPTO_CHECKSOM_SERVER - accepted.

G.

Modify all JDBC Thin based clients to include network encryption parameters in Java.

Buy Now
Questions 9

Database Vault Is configured and enabled In the Oracle database.

Three users are granted the dba, dv_omneb, and dv_acctmgb roles.

There is a requirement to create a user who can:

1. Connect to the database Instance

2. Select from dictionary views

Which users can complete the operation to meet the requirement?

Options:

A.

users granted DV_ACCTMGR and DV_OWNER roles

B.

users granted DV_OWNER role

C.

users granted DBA and DV_OWNER roles

D.

users granted DV_ACCTMGR and DBA roles

Buy Now
Questions 10

Examine this list of capabilities:

1. You can automatically restrict common users from accessing pluggable database (PDB).

2. Enabling Database Vault Operations Control In cdbsroot does not automatically enable It In PDBs.

3. Any common user granted the dv_admin role can enable Database Vault Operations Control.

4. To enable Database Vault Operations Control, use the dbms_macadm.enable_app_protection.

5. Common users' and Invokers' right procedures that must access PDB local data can be added to an exception list.

6. To disable Database Vault Operations Control, use the dbms_macadm.disable_app_protection.

Which statements describe Database Vault Operations Control?

Options:

A.

3, 5, 6

B.

2, 3. 6

C.

2, 4, 6

D.

1, 4, 6

E.

1, 2, 3, 5

Buy Now
Questions 11

Examine these commands and responses:

Which object privilege must be granted to allow execution of the stored procedure?

Options:

A.

grant EXECUTE ON MARY.PBOC2 Co U1;

B.

grant INHERIT PRIVILEGES ON USER U1 TO MARY;

C.

grant INHERIT PRIVILEGES ON USER MARY TO Ul ;

D.

grant EXECUTE ON Ul.PROC2 TO MARY;

Buy Now
Questions 12

Examine this output:

Which three are true?

Options:

A.

John must connect as system to perform backup and recovery operations.

B.

John can query dba tables.

C.

John can perform backup and recovery operations by using SQL.

D.

John can perform backup and recovery operations by using RMAN.

E.

John must connect as sys to perform backup and recovery operations.

F.

John Is not able to perform startup and shutdown operations.

G.

John can query other user's data.

Buy Now
Questions 13

You check the Risk Matrix of the latest Critical Patch Update (CPU).

One of the " Common Vulnerability and Exposure’’ reports (CVEs) has Base Score that is above 9 in the Risk Matrix.

Which one is not a supported method to address this CVE?

Options:

A.

Request a one off patch exception from Oracle Support.

B.

Implement a workaround recommended by Oracle Support.

C.

Upgrade to a new Release.

D.

Install a new Release Update.

E.

Install a new Release Update Revision.

Buy Now
Questions 14

Examine this list:

1. You must monitor access to email column or salary column In the employees table.

2. If any activity is detected, the action must be audited and a notification sent out by email.

3. The database has Unified Auditing enabled.

4. You have created and successfully tested the email sending procedure, sysadmin_fga.emaii._ai.ert.

You create the audit policy:

A user with select privilege on hr.employees executes this :

SELECT email FROM HR.EMPLOYEES;

What will be the result?

Options:

A.

The query will be executed, an entry will be created in the unified audit trail, and the mail will be sent.

B.

The query will be executed, an entry will be created In FGA_LOG$ table, and the mall will be sent.

C.

The query will be executed, but no audit entry will be created nor any mail sent.

D.

The query will be executed, no audit entry will be created but the mall will be sent.

Buy Now
Questions 15

You develop an HR application that must allow multiple sessions to share application attributes. Which statement is executed while implementing the requirement?

Options:

A.

CREATE CONTEXT global_hr USING hr_pkg;

B.

CREATE CONTEXT global_hr USING hr_pkg ACCESSED GLOBALLY;

C.

CREATE CONTEXT global_hr USING hr_pkg INITIALIZED GLOBALLY;

D.

CREATE CONTEXT global_hr USING hr_pkg INITIALIZED EXTERNALLY;

Buy Now
Questions 16

Which three are true concerning command rules?

Options:

A.

System privileges override command rules.

B.

If a command rule's associated rule set evaluation results In an error, the command is not allowed to execute.

C.

A command can have only one command rule that applies to it.

D.

For DML statement command rules, you can specify a wildcard for the object owner.

E.

If a command rule's associated rule set Is disabled, then the rule set evaluates to true.

F.

For DML statement command rules, you can specify a wildcard for the object name.

G.

Object privileges override command rules.

Buy Now
Questions 17

Oracle Database Vault is enabled In the database. You have these requirements:

1. Database administrator dbai must export and import data from and to a non-protected schema.

2. Database administrator dba2 must export and Import data from and to a protected schema.

Which three options together satisfy these requirements?

Options:

A.

Grant become user to dbai.

B.

Grant sysoper to both users.

C.

Run d3ms_macadm.authorize_datapump_user procedure granting dbai privileges to impdp and expdp utilities.

D.

Grant imp_full_database and exp_full_database to dbai and dba2.

E.

Run dbms_macadm.authobize_datapump_useb procedure granting dba2 privileges to impdp and expdp utilities.

F.

Grant become user to dba2.

G.

Grant sysdba to both users.

Buy Now
Questions 18

Which two statements are true about the Secure External Password Store (SEPS)?

Options:

A.

Password credentials are stored on the database server.

B.

Bypassing database authentication adds significant performance benefits to middle-tier applications.

C.

The database does not need to authenticate the connection because the password credentials are stored in a wallet.

D.

Wallet usage secures deployments that rely on password credentials for connecting to databases Instances.

E.

Password rotation policies can be enforced without changing application code.

Buy Now
Questions 19

Which statement can be used to force password complexity in the password file?

Options:

A.

orapwd file=orapwORCL format=12 force-yes

B.

orapwd file=orapwORCL force=yes format=legacy

C.

orapwd file=orapwOPCL forcaat=12

D.

orapwd file=orapwOBCL forroat=12.2

Buy Now
Questions 20

Which two statements are true about column-level transparent data encryption?

Options:

A.

It can bo used for tables in encrypted tablcspaces.

B.

encrypted columns cannot have an Index.

C.

All encrypted columns of a table use the same encryption key.

D.

Column level encrypted data remains encrypted in the buffer cache.

E.

Column-level encryption keys are not encrypted by the master key.

Buy Now
Questions 21

Which two statements are true about Database Vault rules and rule sets?

Options:

A.

You must create a rule set for a rule, before creating the rule.

B.

You con reference Oracle-supplied rules In rule sets that you create.

C.

If a rule set Is disabled. It Is evaluated to true without having Its rules evaluated.

D.

A given rule can be added to only one rule set.

E.

Deleting a rule set also deletes all the rules that have been added to It.

Buy Now
Questions 22

You are Implementing a security policy that makes use of the USERENV namespace.

Which USERRENV value does not change for the duration of a session?

Options:

A.

SESSION_CSER

B.

CURRENT_OSER

C.

CURRENT SCHEMA

D.

CLIENT_INFO

Buy Now
Questions 23

Database user SCOTT requires the privilege to select from all tables and you decide to configure this using a global role.

You have not yet configured the database with Enterprise User Security.

You plan to perform these steps:

1. create role GLOBAI._ROI.E identified globally;

2. grant select any table to GLODAL_COLE;

3. grant GLOBAL_ROLE to SCOTT;

What is the result?

Options:

A.

All statements succeed even without Enterprise User Security configuration, but the role is not effective.

B.

The third statement falls because global roles can be granted only by using a central authority.

C.

The second statement falls because granting a global role can be completed only by using a central authority.

D.

The first statement falls because the database Is not set up with Enterprise User Security.

Buy Now
Questions 24

User jane must report on who has done RMAN backups on a database that has Unified Auditing enabled.

What is the minimum that must be done to allow JANE to generate these reports?

Options:

A.

Use create audit policy.

B.

Use grant audit_admin to Jane;

C.

Use grant audit_viewer to Jane;

D.

Use alter system set AUDIT_SYS_OPERATION= TRUE;

Buy Now
Questions 25

Which CVSS Version 3.1 metric indicates how close an attacker needs to be to the vulnerable component?

Options:

A.

Privileges Required

B.

User Interaction

C.

Attack Vector

D.

Scope

E.

Availability

F.

Attack Complexity

Buy Now
Questions 26

Which two represent the set of users that are never affected by connect command rules?

Options:

A.

SYS

B.

users with the DV_ACCTMGR role

C.

users with the DV_OWNER role

D.

users with the DV_ADMIN role

E.

SYSTEM

Buy Now
Questions 27

Which statement is true about Network ACLs?

Options:

A.

They ate used to control access by users to external network services and resources from the database through PL/SQL.

B.

They are used to provide access to database packages.

C.

They are used to control the usage of UTL_TCP, ITL_HTTP, and UTL_INADDR.

D.

They are used to configure proxy for PL/SQL network utility packages.

Buy Now
Exam Code: 1z0-116
Exam Name: Oracle Database Security Administration
Last Update: Nov 21, 2024
Questions: 90
$64  $159.99
$48  $119.99
$40  $99.99
buy now 1z0-116