ĐĂNG KÝ ĐỂ NHẬN THÔNG TIN MỚI NHẤT

Bộ đề thi quốc tế miễn phí – ORACLE 1z0-528:Oracle Database 11g Security Essentials

Oracle 1Z0-528 Exam Questions & Answers

Number: 1Z0-528

Passing Score: 660

Time Limit: 120 min

File Version: 21.1

QUESTION 1

Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task?

  1. Database Vault
  2. Advanced Security Option
  3. Enterprise Data Masking Pack
  4. Audit Vault

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 2

Which of the following is NOT a feature of the Data Masking Pack?

  1. Secure High Performance Mask Execution
  2. Comprehensive and Extensible Mask Library
  3. Automated patching for Oracle products and the operating system
  4. Sophisticated Masking Techniques

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 3

You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task?

  1. Audit Vault
  2. Database Vault
  3. Advanced Security
  4. Enterprise Manager Data Masking Pack

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 4

You have a system installed with Oracle 11g. You are concerned about the security of the database instances in your system. You plan to use Oracle Database Vault to create several components to manage the security of the database instances. Which of the following components can be created using Oracle Database Vault? Each

correct answer represents a complete solution. Choose all that apply.

  1. Factors
  2. Command rules
  3. Realms
  4. RMAN

Correct Answer: ABC

Section: (none)

Explanation

Explanation/Reference:

QUESTION 5

Sam works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. Sam wants to adopt a security feature on the database that enforces the security rules, regardless of the way the data is accessed. Which of the following security features should he adopt to accomplish the task?

  1. Real Application Cluster (RAC)
  2. Label Security
  3. Enhanced security features with execution context
  4. Virtual Private Database (VPD)

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 6

Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server and deals with the development of various database applications. During such developments, production data is copied into other non-production environments. This leads to several confidential risks. Andrew has been assigned the task to minimize the risk of handling such sensitive information. Which pack of Enterprise Manager should he adopt to accomplish the task?

  1. Oracle Diagnostic Pack
  2. Oracle Data Masking Pack
  3. Oracle Change Management Pack
  4. Oracle Configuration Management Pack

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 7

Which of the following components of Oracle Database Vault is a Java application that is built on top of the Oracle Database Vault PL/SQL application programming interfaces (API)?

  1. Oracle Database Vault Reporting and Monitoring Tools
  2. Oracle Database Vault Administrator (DVA)
  3. Oracle Database Vault DVSYS and DVF Schemas
  4. Oracle Database Vault Access Control Components

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 8

Which of the following are the advantages of Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply.

  1. It disables the separation of duty.
  2. It controls access to database and application data by highly privileged users.
  3. It imposes multi-factor authorization by the use of flexible business rules.
  4. It enables the separation of duty.

Correct Answer: BCD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 9

Which method should be adopted to retrieve all those rows whose sensitive columns have a null value and which are restricted by Virtual Private Database security?

  1. Column masking
  2. Access Control List
  3. Transparent Tablespace Encryption
  4. Transparent Data Encryption

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 10

David works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. David wants to adapt such a security option that will provide no application changes to the database, built-in key management, and high performance to the database. Which security option should he adopt to accomplish the task?

  1. Database Vault
  2. Label Security
  3. Audit Vault
  4. Advanced Security Option

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 11

Which of the following options employs labeling concepts used by government and defense organizations to protect sensitive information and to provide data separation?

  1. Oracle Database Vault Security
  2. Oracle Advanced Security
  3. Oracle Audit Vault Security
  4. Oracle Label Security

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 12

Sam works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. Sam wants to protect the company’s data by encrypting the physical data files created on the operating system. Which of the following types of encryption should he use to accomplish the task?

  1. Transparent Data Encryption (TDE) for securefiles
  2. Transparent Data Encryption (TDE) for column
  3. Transparent Data Encryption (TDE) for tablespace
  4. Network encryption

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 13

You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its database server. The server contains a database named “Company_Project_Details”. The database is shared among multiple departments of the company for regular updation. Looking at the security issues of the database, you have been assigned the task to apply some security solution to the database.

To accomplish the task, you plan to apply Database Label Security on this database. Which of the following components of the Database Label Security should you apply in order to secure this database?

Each correct answer represents a complete solution. Choose all that apply.

  1. Levels
  2. Source database
  3. Compartments
  4. Groups

Correct Answer: ACD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 14

David works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. David wants to adopt security options so as to protect the database of the company. Which of the following security options should he adopt to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

  1. Database Vault
  2. Chain of trust
  3. Audit Vault
  4. Advanced Security Option

Correct Answer: ACD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 15

You have a system installed with Oracle 11g. You are concerned about the security of the database instances in your system. You plan to use Oracle Database Vault to create several components to manage the security of the database instances. Which of the following components can be created using Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply.

  1. RMAN
  2. Realms
  3. Factors
  4. Command rules

Correct Answer: BCD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 16

Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server and deals with the development of various database applications. During such developments, production data is copied into other non-production environments. This leads to several confidential risks. Andrew has been assigned the task to minimize the risk of handling such sensitive information. Which pack of Enterprise Manager should he adopt to accomplish the task?

  1. Oracle Diagnostic Pack
  2. Oracle Configuration Management Pack
  3. Oracle Data Masking Pack
  4. Oracle Change Management Pack

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 17

David works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. David wants to adapt such a security option that will provide no application changes to the database, built-in key management, and high performance to the database. Which security option should he adopt to accomplish the task?

  1. Database Vault
  2. Label Security
  3. Audit Vault
  4. Advanced Security Option

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 18

You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task?

  1. Database Vault
  2. Audit Vault
  3. Advanced Security
  4. Enterprise Manager Data Masking Pack

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 19

You work as a Security Administrator for uCertify Inc. The company uses Oracle 11g as the database server. You have been asked to use an application that creates public and private key pairs and can be also used for storage and management of certificate authority certificates. Which of the following applications will you use to accomplish this task?

  1. Oracle Wallet Manager
  2. Oracle Connection Manager
  3. Oracle Enterprise Manager
  4. Oracle Net Manager

Correct Answer: A

Section: (none) Explanation

Explanation/Reference:

QUESTION 20

Which of the following security options provides easy compliance by automating access control?

  1. Oracle Database Vault
  2. Oracle Data masking Pack
  3. Oracle Advanced Security
  4. Oracle Audit Vault

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 21

Which of the following is NOT a feature of the Data Masking Pack?

  1. Comprehensive and Extensible Mask Library
  2. Secure High Performance Mask Execution
  3. Automated patching for Oracle products and the operating system
  4. Sophisticated Masking Techniques

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 22

David works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. David wants to adopt security options so as to protect the database of the company. Which of the following security options should he adopt to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

  1. Database Vault
  2. Advanced Security Option
  3. Audit Vault
  4. Chain of trust

Correct Answer: ABC

Section: (none)

Explanation

Explanation/Reference:

QUESTION 23

Which method should be adopted to retrieve all those rows whose sensitive columns have a null value and

which are restricted by Virtual Private Database security?

  1. Access Control List
  2. Transparent Data Encryption
  3. Column masking
  4. Transparent Tablespace Encryption

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 24

Streams engine decrypt the encrypted data to allow data transformation (character sets, database versions, platforms, etc.) and it is not encrypted at the time it is made transmitted to the other databases. Which of the following types of encryption is needed to resolve this issue?

  1. Network Encryption
  2. Transparent Data Encryption
  3. TDE Tablespace Encryption
  4. TDE Column Encryption

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 25

Andrew works as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Audit Vault security to the database so that alteration or modification of the data is not allowed. Which of the following features are supported by this security option?

  1. It simplifies compliance reporting.
  2. It provides encryption technique.
  3. It helps in early detection of threats.
  4. It couples fine-grained access control.

Correct Answer: AC

Section: (none)

Explanation

Explanation/Reference:

QUESTION 26

Which of the following are the guidelines of Password Management Policy that enhances the wallet password management module?

Each correct answer represents a complete solution. Choose all that apply.

  1. The minimum password length required is of 8 characters.
  2. The alphanumeric character mix is required.
  3. The minimum password length required is of 6 characters.
  4. The maximum password length is unlimited.

Correct Answer: ABD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 27

Andrew works as a Database Administrator in Infotech Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Advanced Security for the protection of the database. Its also required to apply authentication methods to authenticate users for the database protection. Which of the following authentication methods should he adopt to accomplish the following task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Kerberos
  2. RADIUS
  3. Pre-shared key
  4. Secure Sockets Layer

Correct Answer: ABD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 28

Which of the following authentication methods supported by Oracle Advanced Security provides the benefit of single sign-on (SSO) capability, to enable users to access multiple accounts and applications with a single password? Each correct answer represents a complete solution. Choose all that apply.

  1. Kerberos
  2. Secure Sockets Layer
  3. Remote Authentication Dial-In User Service
  4. Entrust/PKI

Correct Answer: AD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 29

You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its database server. The server contains a database named “Company_Project_Details”. The database is shared among multiple departments of the company for regular updation. Looking at the security issues of the database, you have been assigned the task to apply some security solution to the database.

To accomplish the task, you plan to apply Database Label Security on this database. Which of the following components of the Database Label Security should you apply in order to secure this database?

Each correct answer represents a complete solution. Choose all that apply.

  1. Levels
  2. Source database
  3. Groups
  4. Compartments

Correct Answer: ACD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 30

Sam works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. Sam wants to adopt a security feature on the database that enforces the security rules, regardless of the way the data is accessed. Which of the following security features should he adopt to accomplish the task?

  1. Enhanced security features with execution context
  2. Virtual Private Database (VPD)
  3. Label Security
  4. Real Application Cluster (RAC)

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 31

Which of the following tasks is performed by using ALTER SYSTEM SET ENCRYPTION KEY certificate_ID IDENTIFIED BY password; SQL command?

  1. Create table and encrypt column.
  2. Set or Reset master encryption key
  3. Set or Reset master encryption key to use PKI certificate
  4. Encrypts unencrypted existing column

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 32

Sam works as a Database Administrator for Tech-Mart Inc. The company uses an Oracle 11g database server. Andrew wants to secure the data on the network from unauthorized users by encrypting it. Which of the following security option should he use to accomplish the following task?

  1. Oracle Database Vault
  2. Oracle Data Masking Pack
  3. Oracle Advanced Security
  4. Oracle Audit Vault

Correct Answer: C

Section: (none) Explanation

Explanation/Reference:

QUESTION 33

Which of the following features are required to mask data by making use of Oracle Data Masking Pack ?

  1. Masking definitions
  2. Masking subnet
  3. Masking backward
  4. Masking format libraries

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 34

You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its database server. During the management of company’s database its required to add encrypted column to existing table for the protection of database files. Which of the following SQL commands will you use to accomplish the following task?

  1. ALTER TABLE table_name MODIFY (column_name ENCRYPT);
  2. ALTER SYSTEM SET ENCRYPTION WALLET OPEN IDENTIFIED BY password;
  3. CREATE TABLE table_name (column_name datatype ENCRYPT);
  4. ALTER TABLE table_name ADD (column_name datatype ENCRYPT);

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 35

Which of the following are the advantages of Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply.

  1. It disables the separation of duty.
  2. It imposes multi-factor authorization by the use of flexible business rules.
  3. It controls access to database and application data by highly privileged users.
  4. It enables the separation of duty.

Correct Answer: BCD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 36

Which of the following features of Oracle Advanced Security Option protects the operating system data files?

  1. Kerberos
  2. Transparent Data Encryption
  3. Network Encryption
  4. RADIUS

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 37

Sam works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. Sam wants to protect the company’s data by encrypting the physical data files created on the operating system. Which of the following types of encryption should he use to accomplish the task?

  1. Transparent Data Encryption (TDE) for tablespace
  2. Network encryption
  3. Transparent Data Encryption (TDE) for securefiles
  4. Transparent Data Encryption (TDE) for column

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 38

Which of the following components of Oracle Database Vault is a Java application that is built on top of the Oracle Database Vault PL/SQL application programming interfaces (API)?

  1. Oracle Database Vault Administrator (DVA)
  2. Oracle Database Vault Access Control Components
  3. Oracle Database Vault DVSYS and DVF Schemas
  4. Oracle Database Vault Reporting and Monitoring Tools

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 39

Which of the following utilities is used to obtain Kerberos tickets that are cached in the user’s credential cache from the key distribution center (KDC)?

  1. okinit
  2. orapki
  3. okdstry
  4. oklist

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 40

Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task?

  1. Advanced Security Option
  2. Database Vault
  3. Audit Vault
  4. Enterprise Data Masking Pack

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 41

Sam works as an Application Database Administrator for uCertify Inc. The company uses Oracle 11g as the database. Sam uses data masking pack to reduce the risk of handling important information at the time of application development. Which of the following features should Sam hold as an administrator?

Each correct answer represents a complete solution. Choose all that apply.

  1. Engraved with the knowledge of the database objects
  2. Adds extensions to packaged applications
  3. Adds additional custom database objects
  4. Recommends the data to be hidden and protected

Correct Answer: ABC

Section: (none)

Explanation

Explanation/Reference:

QUESTION 42

Which of the following options employs labeling concepts used by government and defense organizations to protect sensitive information and to provide data separation?

  1. Oracle Database Vault Security
  2. Oracle Audit Vault Security
  3. Oracle Advanced Security
  4. Oracle Label Security

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 43

Rick works as a Database Administrator in Dolliver Inc. The company uses Oracle 11g on its database server. There is a “customer_detail” table in the database. Rick wants to mask the customer number in the table in such a way that it gets masked to the same value across the entire database. Which masking technique of Data Masking Pack should he apply to accomplish the task?

  1. Deterministic masking
  2. Shuffling
  3. Condition-based masking
  4. Compound masking

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 44

Andrew works as a Database Administrator for Business Software Solutions Ltd. The company uses Oracle 11g as the database. Andrew applied Oracle Data Masking Pack to the database so that to put back the fictitious data in place of sensitive data. Which of the following other benefits can this mask provides to the database?

Each correct answer represents a complete solution. Choose all that apply.

  1. Proactive problem identification.
  2. Does not affect the production database.
  3. Increases the productivity of the Database administrator through the masking of sensitive d ata.
  4. Reduces the risk of handling important information when the production data is copied into a non production environment.

Correct Answer: BCD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 45

Which of the following features differentiates TDE column encryption from TDE tablespace encryption? Each correct answer represents a complete solution. Choose all that apply.

  1. The default encryption algorithm for TDE column encryption is AES128 whereas in TDE tablespace encryption it is AES 192 .
  2. In TDE column encryption the encryption candidates are not foreign-key columns whereas in TDE

tablespace encryption they are foreign key columns.

  1. In TDE column encryption the location of sensitive information is known whereas in TDE tablespace encryption it is known.
  2. The indexes of encryption candidates are functional indexes in TDE column encryption whereas in TDE tablespace encryption the indexes are normal B-tree indexes.

Correct Answer: BC

Section: (none)

Explanation

Explanation/Reference:

QUESTION 46

Andrew works as a Database Administrator in Infotech Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Advanced Security for the protection of the database. Its also required to apply authentication methods to authenticate users for the database protection. Which of the following authentication methods should he adopt to accomplish the following task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Pre-shared key
  2. Secure Sockets Layer
  3. Kerberos
  4. RADIUS

Correct Answer: BCD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 47

Rick works as a Database Administrator in Dolliver Inc. The company uses Oracle 11g on its database server. There is a “customer_detail” table in the database. Rick wants to mask the customer number in the table in such a way that it gets masked to the same value across the entire database. Which masking technique of Data Masking Pack should he apply to accomplish the task?

  1. Condition-based masking
  2. Compound masking
  3. Shuffling
  4. Deterministic masking

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 48

You have a system installed with Oracle 11g. You are concerned about the security of the database instances in your system. You plan to use Oracle Database Vault to create several components to manage the security of the database instances. Which of the following components can be created using Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply.

  1. RMAN
  2. Factors
  3. Command rules
  4. Realms

Correct Answer: BCD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 49

Which of the following security features are of Oracle Advanced Security that are used to solve the security challenges enhanced by Security in Enterprise Grid Computing Environments, Security in an Intranet or Internet Environment, and Common Security Threats? Each correct answer represents a complete solution. Choose two.

  1. Protecting Audit data from tampering
  2. Separation of Duty
  3. Strong Authentication
  4. Data Encryption

Correct Answer: CD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 50

David works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. David wants to adopt security options so as to protect the database of the company. Which of the following security options should he adopt to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

  1. Advanced Security Option
  2. Audit Vault
  3. Chain of trust
  4. Database Vault

Correct Answer: ABD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 51

Which of the following authentication methods supported by Oracle Advanced Security provides the benefit of single sign-on (SSO) capability, to enable users to access multiple accounts and applications with a single password? Each correct answer represents a complete solution. Choose all that apply.

  1. Entrust/PKI
  2. Remote Authentication Dial-In User Service
  3. Kerberos
  4. Secure Sockets Layer

Correct Answer: AC

Section: (none)

Explanation

Explanation/Reference:

QUESTION 52

You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task?

  1. Advanced Security
  2. Audit Vault
  3. Database Vault
  4. Enterprise Manager Data Masking Pack

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 53

Which of the following features of Oracle Advanced Security Option protects the operating system data files?

  1. Kerberos
  2. Network Encryption
  3. RADIUS
  4. Transparent Data Encryption

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 54

You work as a Database Administrator for Infotech Inc. The company uses Oracle 11g as its database. The company is required to increase efficiency and lower costs, to automate business processes for which it has to face some security challenges. Which of the following security challenges the company has to face in today’s enterprise computing environments?

  1. Security in Enterprise Grid Computing Environments
  2. Security in an Intranet or Internet Environment
  3. Key hiding
  4. Common Security Threats

Correct Answer: ABD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 55

Which method should be adopted to retrieve all those rows whose sensitive columns have a null value and which are restricted by Virtual Private Database security?

  1. Transparent Data Encryption
  2. Column masking
  3. Access Control List
  4. Transparent Tablespace Encryption

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 56

You works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server .It is required to configure the Kerberos authentication on a database client and server. Which of the following tools will you adapt to accomplish this task?

  1. Oracle Net Manager
  2. Oracle Wallet Manager
  3. Oracle Enterprise Manager
  4. Oracle Connection Manager

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 57

Sam works as a Database Administrator for Tech-Mart Inc. The company uses an Oracle 11g database server. Andrew wants to secure the data on the network from unauthorized users by encrypting it. Which of the following security option should he use to accomplish the following task?

  1. Oracle Audit Vault
  2. Oracle Advanced Security
  3. Oracle Data Masking Pack
  4. Oracle Database Vault

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 58

Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task?

  1. Advanced Security Option
  2. Audit Vault
  3. Database Vault
  4. Enterprise Data Masking Pack

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 59

Andrew works as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Audit Vault security to the database so that alteration or modification of the data is not allowed. Which of the following features are supported by this security option?

  1. It simplifies compliance reporting.
  2. It helps in early detection of threats.
  3. It couples fine-grained access control.
  4. It provides encryption technique.

Correct Answer: AB

Section: (none)

Explanation

Explanation/Reference:

QUESTION 60

Sam works as an Application Database Administrator for uCertify Inc. The company uses Oracle 11g as the database. Sam uses data masking pack to reduce the risk of handling important information at the time of application development. Which of the following features should Sam hold as an administrator?

Each correct answer represents a complete solution. Choose all that apply.

  1. Recommends the data to be hidden and protected
  2. Engraved with the knowledge of the database objects
  3. Adds additional custom database objects
  4. Adds extensions to packaged applications

Correct Answer: BCD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 61

David works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. David wants to adapt such a security option that will provide no application changes to the database, built-in key management, and high performance to the database. Which security option should he adopt to

accomplish the task?

  1. Label Security
  2. Advanced Security Option
  3. Database Vault
  4. Audit Vault

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 62

Which of the following features are required to mask data by making use of Oracle Data Masking Pack ?

  1. Masking subnet
  2. Masking definitions
  3. Masking backward
  4. Masking format libraries

Correct Answer: BD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 63

Which of the following are the guidelines of Password Management Policy that enhances the wallet password management module?

Each correct answer represents a complete solution. Choose all that apply.

  1. The alphanumeric character mix is required.
  2. The minimum password length required is of 6 characters.
  3. The maximum password length is unlimited.
  4. The minimum password length required is of 8 characters.

Correct Answer: ACD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 64

Which of the following are the advantages of Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply.

  1. It controls access to database and application data by highly privileged users.
  2. It disables the separation of duty.
  3. It enables the separation of duty.
  4. It imposes multi-factor authorization by the use of flexible business rules.

Correct Answer: ACD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 65

You work as a Security Administrator for uCertify Inc. The company uses Oracle 11g as the database server. You have been asked to use an application that creates public and private key pairs and can be also used for storage and management of certificate authority certificates. Which of the following applications will you use to accomplish this task?

  1. Oracle Connection Manager
  2. Oracle Net Manager
  3. Oracle Wallet Manager
  4. Oracle Enterprise Manager

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 66

Sam works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. Sam wants to protect the company’s data by encrypting the physical data files created on the operating system. Which of the following types of encryption should he use to accomplish the task?

  1. Transparent Data Encryption (TDE) for securefiles
  2. Transparent Data Encryption (TDE) for tablespace
  3. Network encryption
  4. Transparent Data Encryption (TDE) for column

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 67

Which of the following tasks is performed by using ALTER SYSTEM SET ENCRYPTION KEY certificate_ID IDENTIFIED BY password; SQL command?

  1. Encrypts unencrypted existing column
  2. Set or Reset master encryption key
  3. Create table and encrypt column.
  4. Set or Reset master encryption key to use PKI certificate

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 68

You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its database server. The server contains a database named “Company_Project_Details”. The database is shared among multiple departments of the company for regular updation. Looking at the security issues of the database, you have been assigned the task to apply some security solution to the database.

To accomplish the task, you plan to apply Database Label Security on this database. Which of the following components of the Database Label Security should you apply in order to secure this database?

Each correct answer represents a complete solution. Choose all that apply.

  1. Source database
  2. Levels
  3. Groups
  4. Compartments

Correct Answer: BCD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 69

Which of the following features differentiates TDE column encryption from TDE tablespace encryption? Each correct answer represents a complete solution. Choose all that apply.

  1. In TDE column encryption the location of sensitive information is known whereas in TDE tablespace encryption it is known.
  2. In TDE column encryption the encryption candidates are not foreign-key columns whereas in TDE ablespace encryption they are foreign key columns.
  3. The default encryption algorithm for TDE column encryption is AES128 whereas in TDE tablespace ncryption it is AES 192 .
  4. The indexes of encryption candidates are functional indexes in TDE column encryption whereas in DE tablespace encryption the indexes are normal B-tree indexes.

Correct Answer: AB

Section: (none)

Explanation

Explanation/Reference:

QUESTION 70

You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its atabase server. During the management of company’s database its required to add encrypted olumn to existing table for the protection of database files. Which of the following SQL commands ill you use to accomplish the following task?

  1. ALTER SYSTEM SET ENCRYPTION WALLET OPEN IDENTIFIED BY password;
  2. ALTER TABLE table_name ADD (column_name datatype ENCRYPT);
  3. CREATE TABLE table_name (column_name datatype ENCRYPT);
  4. ALTER TABLE table_name MODIFY (column_name ENCRYPT);

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 71

Streams engine decrypt the encrypted data to allow data transformation (character sets, database ersions, platforms, etc.) and it is not encrypted at the time it is made transmitted to the other atabases. Which of the following types of encryption is needed to resolve this issue?

  1. Transparent Data Encryption
  2. TDE Column Encryption
  3. Network Encryption
  4. TDE Tablespace Encryption

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 72

Sam works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. Sam wants to adopt a security feature on the database that enforces the security rules, regardless of the way the data is accessed. Which of the following security features should he adopt to accomplish the task?

  1. Real Application Cluster (RAC)
  2. Virtual Private Database (VPD)
  3. Enhanced security features with execution context
  4. Label Security

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 73

Which of the following is NOT a feature of the Data Masking Pack?

  1. Automated patching for Oracle products and the operating system
  2. Sophisticated Masking Techniques
  3. Secure High Performance Mask Execution
  4. Comprehensive and Extensible Mask Library

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 74

Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database

server and deals with the development of various database applications. During such developments, production data is copied into other non-production environments. This leads to several confidential risks. Andrew has been assigned the task to minimize the risk of handling such sensitive information. Which pack of Enterprise Manager should he adopt to accomplish the task?

  1. Oracle Configuration Management Pack
  2. Oracle Diagnostic Pack
  3. Oracle Change Management Pack
  4. Oracle Data Masking Pack

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 75

Which of the following options employs labeling concepts used by government and defense organizations to protect sensitive information and to provide data separation?

  1. Oracle Advanced Security
  2. Oracle Audit Vault Security
  3. Oracle Database Vault Security
  4. Oracle Label Security

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 76

Which of the following utilities is used to obtain Kerberos tickets that are cached in the user’s credential cache from the key distribution center (KDC)?

  1. oklist
  2. okinit
  3. okdstry
  4. orapki

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 77

Andrew works as a Database Administrator for Business Software Solutions Ltd. The company uses Oracle 11g as the database. Andrew applied Oracle Data Masking Pack to the database so that to put back the fictitious data in place of sensitive data. Which of the following other benefits can this mask provides to the database?

Each correct answer represents a complete solution. Choose all that apply.

  1. Proactive problem identification.
  2. Increases the productivity of the Database administrator through the masking of sensitive d ata.
  3. Reduces the risk of handling important information when the production data is copied into a non production environment.
  4. Does not affect the production database.

Correct Answer: BCD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 78

Which of the following components of Oracle Database Vault is a Java application that is built on top of the Oracle Database Vault PL/SQL application programming interfaces (API)?

  1. Oracle Database Vault DVSYS and DVF Schemas
  2. Oracle Database Vault Reporting and Monitoring Tools
  3. Oracle Database Vault Access Control Components
  4. Oracle Database Vault Administrator (DVA)

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 79

Which of the following security options provides easy compliance by automating access control?

  1. Oracle Audit Vault
  2. Oracle Database Vault
  3. Oracle Data masking Pack
  4. Oracle Advanced Security

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 80

Which of the following features is supported by Oracle Label Security?

  1. It provides advanced spatial analysis features for complex geographic information systems (GIS) applications.
  2. It provides static and dynamic caching of Oracle database tables.
  3. It provides sophisticated and flexible security based on row labels for fine-grained access c ontrol.
  4. It provides scalable performance as the demand for database throughput grows.

Correct Answer: C

Section: (none)

Explanation Explanation/Reference:

QUESTION 81

Which of the following database options provides multi-level security?

  1. Oracle On-Line Analytical Processing
  2. Oracle Partitioning
  3. Oracle Label Security
  4. Oracle Real Application Clusters

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 82

Which of the following security options provides the encryption of disk-based backups of the database?

  1. Oracle Enterprise Manager
  2. Oracle Database Vault
  3. Oracle Audit Vault
  4. Oracle Advanced

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 83

Which security feature should be used in the environment where multiple users access the same database and only specific information is available to each group?

  1. Column masking
  2. Label Security
  3. Virtual Private Database
  4. Audit Vault

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 84

Which testing can help customers to implement database changes with minimum risk?

  1. Real Application Testing
  2. Networked Application Testing
  3. Cloud Application Testing
  4. Unit Testing

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 85

Which of the following is a feature of the Operating system audit log collection (OSAUD)?

  1. It retrieves audit records from fine-grained audit trails.
  2. It uses Oracle LogMiner and Streams to retrieve logical change records (LCRs) from the redo log files.
  3. It retrieves audit records from the database audit trail.
  4. It retrieves audit records from the OS audit file.

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 86

Which of the following is an Oracle Audit Vault Server component?

  1. Audit Vault Auditor
  2. Oracle Database
  3. Audit Data Collection
  4. SQL Server

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 87

Which of the following features is supported by Oracle Audit Vault?

  1. Hardware Security Module (HSM) TDE Master Key Protection
  2. Lower IT costs with audit policies
  3. Transport Layer Security (TLS) Support
  4. SSL/TLS network encryption

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 88

Which of the following security products builds customer reports against an open warehouse schema?

  1. Oracle Database Vault Security
  2. Oracle Label Security
  3. Oracle Audit Vault Security
  4. Oracle Advanced Security

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 89

Which of the following components includes Oracle Container for J2EE (OC4J) and Oracle Database Client components, and is deployed within its own directory?

  1. Audit Vault Server
  2. Audit Vault Collector
  3. Audit Vault Agent
  4. Audit Vault Console

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 90

Which of the following types of encryption is used to encrypt data in flight with native encryption?

  1. Network encryption
  2. Transparent data encryption
  3. Endpoint encryption
  4. Transparent tablespace encryption

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 91

Which of the following encryption algorithms is used by transparent data encryption by default?

  1. 3DES168
  2. AES128
  3. AES256
  4. AES192

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 92

Which of the following is the container in which transparent data encryption stores the master key?

  1. Role
  2. Realm
  3. Schema
  4. Wallet

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 93

Which of the following commands is used to load the master encryption key after the database is restarted?

  1. ALTER SYSTEM SET ENCRYPTION WALLET OPEN IDENTIFIED
  2. ALTER SYSTEM SET ENCRYPTION WALLET OPEN IDENTIFIED BY password
  3. ALTER SYSTEM SET ENCRYPTION KEY IDENTIFIED BY password
  4. ALTER SYSTEM SET ENCRYPTION WALLET CLOSE

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 94

Which of the following features differentiates tablespace encryption from column encryption?

  1. It is completely transparent to the application.
  2. It allows index range scans on data.
  3. It protects data in undo and redo logs.
  4. Its master encryption key is stored in the Oracle wallet.

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 95

Which of the following roles or privileges is created during installation and used for creating new database accounts?

  1. SYSDBA
  2. DV_OWNER
  3. SYSOPER
  4. DV_ACCTMGR

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 96

Which of the following is a functional grouping of database schemas and roles that must be secured for a given application?

  1. Role
  2. Schema
  3. Realm
  4. Wallet

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 97

Which of the following components involves command rule granularity?

  1. Multi-Factor Authorization
  2. Realms
  3. Reporting
  4. Auditing

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 98

Which of the following tasks is assigned to the database administrator while using database vault?

  1. Account management
  2. Resource management
  3. Security responsibilities
  4. System management

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 99

Which of the following regulations addresses unauthorized access to data?

  1. Basel II – Internal Risk Management
  2. Payment Card Industry Data Security Standard (PCI DSS)
  3. Sarbanes-Oxley Section 409
  4. Gramm-Leach-Bliley

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 100

Which of the following Enterprise Manager Packs supports masking and script generation?

  1. Oracle Tuning
  2. Oracle Change Management
  3. Oracle Configuration Management
  4. Oracle Data Masking

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 101

Which of the following packs involves condition-based, deterministic, and compound masking echniques?

  1. Oracle Provisioning
  2. Oracle Tuning
  3. Oracle Data Masking
  4. Oracle Configuration Management

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 102

Which of the following is an advantage of Data Masking Pack?

  1. Automatically maintained workload history facilitates historical performance analysis.
  2. Provides automatic tuning of SQL statements.
  3. Eliminate errors by automating deployment of database changes across environments.
  4. Rapid sharing of production data in compliance with data privacy regulations.

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 103

Which of the following packs has the Clone and Mask workflow feature?

  1. Oracle Data Masking
  2. Oracle Provisioning and Patch Automation
  3. Oracle Tuning Pack
  4. Oracle Change Management

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 104

Which of the following options defines a data masking operation to be implemented on one or more tables in a database?

  1. Masking format libraries
  2. Data Masking Workflow
  3. Masking definition
  4. Automatic Storage Management

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 105

Andrew works as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Audit Vault security to the database so that alteration or modification of the data is

not allowed. Which of the following features are supported by this security option?

  1. It helps in early detection of threats.
  2. It provides encryption technique.
  3. It simplifies compliance reporting.
  4. It couples fine-grained access control.

Correct Answer: AC

Section: (none)

Explanation

Explanation/Reference:

QUESTION 106

Which method should be adopted to retrieve all those rows whose sensitive columns have a null value and which are restricted by Virtual Private Database security?

  1. Transparent Tablespace Encryption
  2. Access Control List
  3. Transparent Data Encryption
  4. Column masking

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 107

Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task?

  1. Enterprise Data Masking Pack
  2. Audit Vault
  3. Database Vault
  4. Advanced Security Option

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 108

Andrew works as a Database Administrator for Business Software Solutions Ltd. The company uses Oracle 11g as the database. Andrew applied Oracle Data Masking Pack to the database so that to put back the fictitious data in place of sensitive data. Which of the following other benefits can this mask provides to the database?

Each correct answer represents a complete solution. Choose all that apply.

  1. Proactive problem identification.
  2. Increases the productivity of the Database administrator through the masking of sensitive d ata.
  3. Reduces the risk of handling important information when the production data is copied into a non production environment.
  4. Does not affect the production database.

Correct Answer: BCD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 109

Which of the following features are required to mask data by making use of Oracle Data Masking Pack ?

  1. Masking subnet
  2. Masking backward
  3. Masking format libraries
  4. Masking definitions

Correct Answer: CD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 110

Which of the following features differentiates TDE column encryption from TDE tablespace encryption? Each correct answer represents a complete solution. Choose all that apply.

  1. In TDE column encryption the location of sensitive information is known whereas in TDE tablespace encryption it is known.
  2. In TDE column encryption the encryption candidates are not foreign-key columns whereas in TDE tablespace encryption they are foreign key columns.
  3. The default encryption algorithm for TDE column encryption is AES128 whereas in TDE tablespace encryption it is AES 192 .
  4. The indexes of encryption candidates are functional indexes in TDE column encryption whereas in TDE tablespace encryption the indexes are normal B-tree indexes.

Correct Answer: AB

Section: (none)

Explanation

Explanation/Reference:

QUESTION 111

Which of the following options employs labeling concepts used by government and defense organizations to protect sensitive information and to provide data separation?

  1. Oracle Audit Vault Security
  2. Oracle Advanced Security
  3. Oracle Database Vault Security
  4. Oracle Label Security

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 112

Sam works as a Database Administrator for Tech-Mart Inc. The company uses an Oracle 11g database server. Andrew wants to secure the data on the network from unauthorized users by encrypting it. Which of the following security option should he use to accomplish the following task?

  1. Oracle Audit Vault
  2. Oracle Data Masking Pack
  3. Oracle Advanced Security
  4. Oracle Database Vault

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 113

Sam works as an Application Database Administrator for uCertify Inc. The company uses Oracle 11g as the database. Sam uses data masking pack to reduce the risk of handling important information at the time of application development. Which of the following features should Sam hold as an administrator?

Each correct answer represents a complete solution. Choose all that apply.

  1. Adds extensions to packaged applications
  2. Recommends the data to be hidden and protected
  3. Engraved with the knowledge of the database objects
  4. Adds additional custom database objects

Correct Answer: ACD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 114

You works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server .It is required to configure the Kerberos authentication on a database client and server. Which of the following tools will you adapt to accomplish this task?

  1. Oracle Wallet Manager
  2. Oracle Connection Manager
  3. Oracle Net Manager
  4. Oracle Enterprise Manager

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 115

Which of the following security features are of Oracle Advanced Security that are used to solve the security challenges enhanced by Security in Enterprise Grid Computing Environments, Security in an Intranet or Internet Environment, and Common Security Threats? Each correct answer represents a complete solution. Choose two.

  1. Protecting Audit data from tampering
  2. Separation of Duty
  3. Strong Authentication
  4. Data Encryption

Correct Answer: CD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 116

Streams engine decrypt the encrypted data to allow data transformation (character sets, database versions, platforms, etc.) and it is not encrypted at the time it is made transmitted to the other databases. Which of the following types of encryption is needed to resolve this issue?

  1. TDE Tablespace Encryption
  2. Network Encryption
  3. TDE Column Encryption
  4. Transparent Data Encryption

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 117

Sam works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. Sam wants to adopt a security feature on the database that enforces the security rules, regardless of the way the data is accessed. Which of the following security features should he adopt to accomplish the task?

  1. Enhanced security features with execution context
  2. Virtual Private Database (VPD)
  3. Real Application Cluster (RAC)
  4. Label Security

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 118

Which of the following tasks is performed by using ALTER SYSTEM SET ENCRYPTION KEY certificate_ID IDENTIFIED BY password; SQL command?

  1. Set or Reset master encryption key to use PKI certificate
  2. Encrypts unencrypted existing column
  3. Create table and encrypt column.
  4. Set or Reset master encryption key

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 119

Sam works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. Sam wants to protect the company’s data by encrypting the physical data files created on the operating system. Which of the following types of encryption should he use to accomplish the task?

  1. Network encryption
  2. Transparent Data Encryption (TDE) for tablespace
  3. Transparent Data Encryption (TDE) for column
  4. Transparent Data Encryption (TDE) for securefiles

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 120

Rick works as a Database Administrator in Dolliver Inc. The company uses Oracle 11g on its database server. There is a “customer_detail” table in the database. Rick wants to mask the customer number in the table in such a way that it gets masked to the same value across the entire database. Which masking technique of Data Masking Pack should he apply to accomplish the task?

  1. Condition-based masking
  2. Compound masking
  3. Shuffling
  4. Deterministic masking

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 121

You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its database server. The server contains a database named “Company_Project_Details”. The database is shared among multiple departments of the company for regular updation. Looking at the security issues of the database, you have been assigned the task to apply some security solution to the database.

To accomplish the task, you plan to apply Database Label Security on this database. Which of the following components of the Database Label Security should you apply in order to secure this database?

Each correct answer represents a complete solution. Choose all that apply.

  1. Groups
  2. Levels
  3. Source database
  4. Compartments

Correct Answer: ABD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 122

David works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. David wants to adopt security options so as to protect the database of the company. Which of the following security options should he adopt to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

  1. Audit Vault
  2. Advanced Security Option
  3. Database Vault
  4. Chain of trust

Correct Answer: ABC

Section: (none)

Explanation

Explanation/Reference:

QUESTION 123

You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task?

  1. Audit Vault
  2. Enterprise Manager Data Masking Pack
  3. Database Vault
  4. Advanced Security

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 124

Which of the following are the guidelines of Password Management Policy that enhances the wallet password management module?

Each correct answer represents a complete solution. Choose all that apply.

  1. The maximum password length is unlimited.
  2. The minimum password length required is of 6 characters.
  3. The alphanumeric character mix is required.
  4. The minimum password length required is of 8 characters.

Correct Answer: ACD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 125

Which of the following security options provides easy compliance by automating access control?

  1. Oracle Database Vault
  2. Oracle Data masking Pack
  3. Oracle Advanced Security
  4. Oracle Audit Vault

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 126

Rick works as a Database Administrator in Dolliver Inc. The company uses Oracle 11g on its database server. There is a “customer_detail” table in the database. Rick wants to mask the customer number in the table in such a way that it gets masked to the same value across the entire database. Which masking technique of Data Masking Pack should he apply to accomplish the task?

  1. Condition-based masking
  2. Compound masking
  3. Shuffling
  4. Deterministic masking

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 127

Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task?

  1. Database Vault
  2. Advanced Security Option
  3. Enterprise Data Masking Pack
  4. Audit Vault

Correct Answer: D

Section: (none)

Explanation

Explanation/Reference:

QUESTION 128

Which of the following is NOT a feature of the Data Masking Pack?

  1. Secure High Performance Mask Execution
  2. Comprehensive and Extensible Mask Library
  3. Automated patching for Oracle products and the operating system
  4. Sophisticated Masking Techniques

Correct Answer: C

Section: (none)

Explanation

Explanation/Reference:

QUESTION 129

You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task?

  1. Audit Vault
  2. Database Vault
  3. Advanced Security
  4. Enterprise Manager Data Masking Pack

Correct Answer: B

Section: (none)

Explanation

Explanation/Reference:

QUESTION 130

Which of the following is NOT a feature of the Data Masking Pack?

  1. Automated patching for Oracle products and the operating system
  2. Sophisticated Masking Techniques
  3. Secure High Performance Mask Execution
  4. Comprehensive and Extensible Mask Library

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 131

Which of the following security options provides easy compliance by automating access control?

  1. Oracle Audit Vault
  2. Oracle Database Vault
  3. Oracle Data masking Pack
  4. Oracle Advanced Security

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 132

Which of the following are the advantages of Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply.

  1. It disables the separation of duty.
  2. It controls access to database and application data by highly privileged users.
  3. It imposes multi-factor authorization by the use of flexible business rules.
  4. It enables the separation of duty.

Correct Answer: BCD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 133

Andrew works as a Database Administrator in Infotech Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Advanced Security for the protection of the database. Its also required to apply authentication methods to authenticate users for the database protection. Which of the following authentication methods should he adopt to accomplish the following task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Pre-shared key
  2. Secure Sockets Layer
  3. Kerberos
  4. RADIUS

Correct Answer: BCD

Section: (none)

Explanation

Explanation/Reference:

QUESTION 134

Which testing can help customers to implement database changes with minimum risk?

  1. Real Application Testing
  2. Networked Application Testing
  3. Cloud Application Testing
  4. Unit Testing

Correct Answer: A

Section: (none)

Explanation

Explanation/Reference:

QUESTION 135

Which of the following features differentiates TDE column encryption from TDE tablespace encryption? Each correct answer represents a complete solution. Choose all that apply.

  1. In TDE column encryption the location of sensitive information is known whereas in TDE tablespace encryption it is known.
  2. In TDE column encryption the encryption candidates are not foreign-key columns whereas in TDE tablespace encryption they are foreign key columns.
  3. The default encryption algorithm for TDE column encryption is AES128 whereas in TDE tablespace encryption it is AES 192 .
  4. The indexes of encryption candidates are functional indexes in TDE column encryption whereas in TDE tablespace encryption the indexes are normal B-tree indexes.

Correct Answer: AB

Section: (none)

Explanation

Explanation/Reference:

QUESTION 136

You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task?

  1. Audit Vault
  2. Database Vault
  3. Advanced Security
  4. Enterprise Manager Data Masking Pack

Correct Answer: B

Section: (none)

Explanation

Views: 51





    Câu hỏi bảo mật

    Trả lời

    Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *