Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

1z0-116 Exam Dumps - Oracle Database Security Questions and Answers

Question # 4

Which three are part of an access control list (ACL) when using Real Application Security?

Options:

A.

privileges

B.

schemas

C.

data realms

D.

column constraints

E.

policies

F.

data realm constraints

G.

roles

Buy Now
Question # 5

Examine these commands and responses:

User Karen is an enterprise user.

Which two commands are used to allow this login?

Options:

A.

GRANT CREATE SESSION TO karan;

B.

CREATE USER guest IDENTIFIED BY karen;

C.

CREATE USER karen IDENTIFIED BY guest;

D.

CREATE USER guest IDENTIFIED GLOBALLY as '';

E.

GRANT CREATE SESSION TO guest;

Buy Now
Question # 6

You Issue this statement as user SYS:

audit, context namespace kilimanjaro attributes a, b;

Which is true?

Options:

A.

The statement will audit all users.

B.

The statement will not audit any users.

C.

The statement will only audit sys.

D.

The statement must be updated to specify which users to audit.

Buy Now
Question # 7

You are connected to an Oracle database Instance as a user with privileges to query the hr.employees table.

You are not exempt from any reduction policies.

Examine this query and result:

You implement this Data Redaction policy:

You re-execute the select statement.

What is the result?

A)

B)

C)

D)

E)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Question # 8

As an Autonomous Transaction Processing (ATP) database administrator, you want to extend the storage capacity In the database.

Examine this command and output from the database:

What is the reason for the error?

Options:

A.

The storage quota has been reached for the ATP database.

B.

The create TABLESAPECE statement is not available in ATP.

C.

There is not enough storage available in the ATP database.

D.

You must be explicitly granted the create TABLESPACE privilege in ATP.

E.

Database Vault prevents you from executing this command.

Buy Now
Question # 9

Which two statements are true about column-level transparent data encryption?

Options:

A.

It can bo used for tables in encrypted tablcspaces.

B.

encrypted columns cannot have an Index.

C.

All encrypted columns of a table use the same encryption key.

D.

Column level encrypted data remains encrypted in the buffer cache.

E.

Column-level encryption keys are not encrypted by the master key.

Buy Now
Question # 10

Examine this command:

Which two statements are true?

Options:

A.

Opening the software keystore from remote computers is possible.

B.

Opening the software keystore from the local computer Is possible.

C.

Opening the software keystore from remote computers is not possible.

D.

Opening the software keystore must always be done manually on the local computer.

E.

Opening the software keystore from the local computer is not possible.

Buy Now
Question # 11

To avoid hard coding passwords in scripts, you have elected to create an external password store-Examine this list of steps:

1. Set the external password store wallet location.

ALTER SYSTEM SET EXTERNAL_KEYSTORE_CREDENTIAL_LOCATION = "/•tc/ORACLE/WALLETS/orcl/external_Btore" SCOPE c SPFILE;

2. Log in as a user who has syskm privileges.

3. Create an auto-logln keystore that contains the keystore password including the add secret clause.

ADMINISTER KEY MANAGEMENT ADD SECRET 'password'

FOR CLIENT 'TDE_WALLET'

TO LOCAL AUTO_LOGIH KEYSTORE '/etc/0RACLE/WALLETS/orcl/extemal_store';

4. Restart the database instance as sysdba.

SHUTDOWN IMMEDIATE STARTUP

5. Create an auto-logln keystore that contains the keystore password.

ADMINISTER KEY MANAGEMENT

FOR CLIENT 'TDE_WALLET'

TO LOCAL AUTO_L0GIN KEYSTORE ' /etc/ORACLE/WALLETS/orcl/external_store' ;

6. Set an Encryption Key.

ADMINISTER KEY MANAGEMENT SET ENCRYPTION KEY IDENTIFIED BY keystore_password WITH BACKUP

Identify the minimum number of steps in the correct order that must be performed to create the external password store.

Options:

A.

2,1,3,4

B.

1,2,5,4

C.

1,2,3,6,4

D.

1,2,6,3,5

E.

2,3,6,4

F.

1,2,3,4

Buy Now
Question # 12

A policy predicate function Is associated with an enabled Virtual Private Database (VPD) policy for a table.

Which two arguments are passed to the function?

Options:

A.

the table name

B.

the schema owning the table

C.

the policy type

D.

the policy name

E.

the policy group to which the policy belongs

Buy Now
Question # 13

Examine this code which executes successfully:

If the IN_OFFICE_ON_WEEKEND rule set returns true for an attempt to connect from Inside the office on weekends, which two are true about the effects of this configuration?

Options:

A.

JIM con never connect.

B.

This has no effect on tom's connect attempts.

C.

TOM can never connect.

D.

JIM can only connect when In the office on weekends.

E.

This has no effect on JIM'S connection attempts.

Buy Now
Exam Code: 1z0-116
Exam Name: Oracle Database Security Administration
Last Update: Feb 22, 2025
Questions: 90
1z0-116 pdf

1z0-116 PDF

$25.5  $84.99
1z0-116 Engine

1z0-116 Testing Engine

$28.5  $94.99
1z0-116 PDF + Engine

1z0-116 PDF + Testing Engine

$40.5  $134.99