This page was exported from Free valid test braindumps [ http://free.validbraindumps.com ] Export date:Sat Apr 12 22:16:37 2025 / +0000 GMT ___________________________________________________ Title: 1Z0-116 Questions - Truly Beneficial For Your Oracle Exam (Updated 92 Questions) [Q25-Q49] --------------------------------------------------- 1Z0-116 Questions - Truly Beneficial For Your Oracle Exam (Updated 92 Questions) View All 1Z0-116 Actual Exam Questions, Answers and Explanations for Free NO.25 You are connected to an Oracle database Instance as a user with privileges to query the hr.employees table.You are not exempt from any reduction policies.Examine this query and result:You implement this Data Redaction policy:You re-execute the select statement.What is the result?A)B)C)D)E)  Option A  Option B  Option C  Option D  Option E NO.26 Which statement is true about Network ACLs?  They ate used to control access by users to external network services and resources from the database through PL/SQL.  They are used to provide access to database packages.  They are used to control the usage of UTL_TCP, ITL_HTTP, and UTL_INADDR.  They are used to configure proxy for PL/SQL network utility packages. The NETWORK_ACL_ADMIN package provides the interface to administer the network access control lists (ACL). ACLs are used to control access by users to external network services and resources from the database through PL/SQL network utility packages including UTL_TCP, UTL_HTTP, UTL_SMTP andUTL_INADDR.https://docs.oracle.com/database/121/ARPLS/d_networkacl_adm.htm#ARPLS74568NO.27 Which two tasks should you perform initially to Implement native network encryption without disrupting client applications?  Upgrade all OCI-basod clients to match the database version.  Set the server side sqinet.oia parameter sqlnet.encryption_server = requested.  Configure the listener with an endpoint for protocol TCPS.  Verify which clients have encrypted connections using the view vSsession_CONNECT_INFO.  Set the client side sqinec.ora parameter SQLNET.ENCRYPTION _client = required.  Set the server side sqinot.ora parameter SQLNET.CRYPTO_CHECKSOM_SERVER – accepted.  Modify all JDBC Thin based clients to include network encryption parameters in Java. NO.28 You must mask data consistently In three database copies such that data relations across the databases remain In place.Which Data Masking Format allows this?  Shuffle  Auto Mask  Array List  Substitute  Random Strings NO.29 You grant user JANE the SYSDBA administrative privilege. Which two are true?  User JANE must always connect as SYSDBA to the database instance.  User JANE can grant SYSDBA privilege to roles.  User JANE must use operating system authentication.  User JANE can create objects In sys schema only when connected as SYSDBA.  User JANE acquires the DBA role by default.  User JANE can backup and recover the database. NO.30 Which type of attack attempts to find data by repeatedly trying similar SQL with a modified predicate?  timing attack  Inference attack  data remanence attack  cache attack  side-channel attack  known-plaintext attack NO.31 For which two reasons would you define Network ACLs?  for configuring fine-grained access control for users and roles that need to access external network services from the database  for configuring fine-grained access control to Oracle wallets to make HTTP requests that require password or client-certificate authentication  to create auditing policies regarding the usage of network services from the database  to block network attacks or denial of service attacks directed at the database  to Improve the performance of the database applications that require access to remote network services NO.32 Which two statements are true about running the Oracle Database Security Assessment Tool (DBSAT) Collector?  It runs only on UNIX/Linux systems.  It must connect to the database using a SYSDBA connection.  It must be run by an OS user with read permissions on files and directories under ORACLE_HOME.  It runs only on Windows systems.  It must be run on the server that contains the database. NO.33 Which two authorization rights does a Database Vault realm owner have that a realm participant does not have?  Add or remove realm-protected objects to or from the reaim.  Grant or revoke privileges on realm-protected objects to or from other users.  Add or remove realm-secured database roles to or from the realm.  Grant or revoke system privileges to access objects protected by the realm.  Add or remove participants to or from the realm.  Add or remove owners to or from the realm.  Grant or revoke realm-secured database roles. NO.34 You are Implementing a security policy that makes use of the USERENV namespace.Which USERRENV value does not change for the duration of a session?  SESSION_CSER  CURRENT_OSER  CURRENT SCHEMA  CLIENT_INFO NO.35 Examine this command :GRANT EXEMPT ACCESS POLICY TO PUBLIC;Which Transparent Sensitive Data Protection functionality will be affected when this command is executed?  Data Redaction  Bind Masking  Virtual Private Database  Transparent Data Encryption NO.36 You check the Risk Matrix of the latest Critical Patch Update (CPU).One of the ” Common Vulnerability and Exposure” reports (CVEs) has Base Score that is above 9 in the Risk Matrix.Which one is not a supported method to address this CVE?  Request a one off patch exception from Oracle Support.  Implement a workaround recommended by Oracle Support.  Upgrade to a new Release.  Install a new Release Update.  Install a new Release Update Revision. NO.37 Which two statements are true about column-level transparent data encryption?  It can bo used for tables in encrypted tablcspaces.  encrypted columns cannot have an Index.  All encrypted columns of a table use the same encryption key.  Column level encrypted data remains encrypted in the buffer cache.  Column-level encryption keys are not encrypted by the master key. NO.38 Which CVSS Version 3.1 metric indicates how close an attacker needs to be to the vulnerable component?  Privileges Required  User Interaction  Attack Vector  Scope  Availability  Attack Complexity NO.39 When querying the database view, VSECRYPTION_WALLET, the status Is OPEN_NO_MASTER _KEY. What does this mean?  You do not have select privileges on this database view.  The master key has been corrupted.  The key store is not open.  The master key has not been created.  This is expected behavior for this view. NO.40 Examine this output:Which three are true?  John must connect as system to perform backup and recovery operations.  John can query dba tables.  John can perform backup and recovery operations by using SQL.  John can perform backup and recovery operations by using RMAN.  John must connect as sys to perform backup and recovery operations.  John Is not able to perform startup and shutdown operations.  John can query other user’s data. NO.41 You are the Service Consumer In the Cloud Shared Responsibility Model.Which three are your responsibility when using the Infrastructure as a Service (IaaS)?  application  host Infrastructure  network  data  physical  guest OS  virtualization  database NO.42 Examine these commands that execute successfully:What must be done to allow the index to be used?  Use tublespace encryption instead of column encryption.  Add the first_name column to the ix_employee Index to Improve its selectivity.  Create a SQL baseline to preserve the execution plan from before the encryption.  Enable encryption hardware acceleration on the CPUs of the machine. NO.43 Which two commands can a user with the syskm privilege execute?  ALTER DATABASE DICTIONARY REKEY CREDENTIALS;  SELECT * FROM DBA_OBJECTS;  SELECT * FROM DBA_TABLESPACES WHERE ENCRYPTED = ‘YES*;  ADMINISTER KEY MANAGEMENT SET KFYSTOBF OPEN IDENTIFIED BY password:  ALTER SYSTEM FLUSH PASSWORDFILE_METADATA_CACHE;  ALTER TABLESPACE APPDATA ENCRYPTION OFFLINE ENCRYPT; NO.44 Database Vault is not used in your installation.Why is a conventional secure application role more secure than a normal role?  It Is In effect only when configured as a default role for the user.  It requires a password to be set.  It can be set only by a package or procedure that is created with deflner’s rights.  It can be set only by users with the grant any bole privilege.  It can be set only by a package or procedure associated with the role definition. NO.45 Database Vault Is configured and enabled In the Oracle database.Three users are granted the dba, dv_omneb, and dv_acctmgb roles.There is a requirement to create a user who can:1. Connect to the database Instance2. Select from dictionary viewsWhich users can complete the operation to meet the requirement?  users granted DV_ACCTMGR and DV_OWNER roles  users granted DV_OWNER role  users granted DBA and DV_OWNER roles  users granted DV_ACCTMGR and DBA roles NO.46 As the SYSKM user you must create the password-based keystore, which will be used for TDE. Examine this list:Identify the sequence that Oracle uses to search for the keystore and its location.  3,5,2,4,1  1,4,5,2  1,2,5,4  1,2,3,5 NO.47 Which two represent the set of users that are never affected by connect command rules?  SYS  users with the DV_ACCTMGR role  users with the DV_OWNER role  users with the DV_ADMIN role  SYSTEM NO.48 If a column is not specified in a Data Redaction Policy, to which column(s) is it applied?  none of the columns  foreign key columns only  the primary and foreign key columns  columns with any type of constraint  the primary key column only NO.49 Using Unified Audit, you must determine who performed an pkan backup ot recovery operations on a database.You are connected as sysdba.Which statement(s) achieve this?A)B)C)D)E)  Option A  Option B  Option C  Option D  Option E  Loading … 1Z0-116 dumps Free Test Engine Verified By It Certified Experts: https://www.validbraindumps.com/1Z0-116-exam-prep.html --------------------------------------------------- Images: https://free.validbraindumps.com/wp-content/plugins/watu/loading.gif https://free.validbraindumps.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-06-07 10:24:49 Post date GMT: 2022-06-07 10:24:49 Post modified date: 2022-06-07 10:24:49 Post modified date GMT: 2022-06-07 10:24:49