This page was exported from Actual Test Materials [ http://blog.actualtests4sure.com ] Export date:Fri Nov 15 22:27:57 2024 / +0000 GMT ___________________________________________________ Title: [Q55-Q75] Oracle 1Z0-116 Practice Verified Answers - Pass Your Exams For Sure! [2022] --------------------------------------------------- Oracle 1Z0-116 Practice Verified Answers - Pass Your Exams For Sure! [2022] Valid Way To Pass Oracle Database Security's 1Z0-116 Exam NO.55 As an Autonomous Transaction Processing (ATP) database administrator, you want to extend the storage capacity In the database.Examine this command and output from the database:What is the reason for the error?  The storage quota has been reached for the ATP database.  The create TABLESAPECE statement is not available in ATP.  There is not enough storage available in the ATP database.  You must be explicitly granted the create TABLESPACE privilege in ATP.  Database Vault prevents you from executing this command. NO.56 Examine this list:1. You must monitor access to email column or salary column In the employees table.2. If any activity is detected, the action must be audited and a notification sent out by email.3. The database has Unified Auditing enabled.4. You have created and successfully tested the email sending procedure, sysadmin_fga.emaii._ai.ert.You create the audit policy:A user with select privilege on hr.employees executes this :SELECT email FROM HR.EMPLOYEES;What will be the result?  The query will be executed, an entry will be created in the unified audit trail, and the mail will be sent.  The query will be executed, an entry will be created In FGA_LOG$ table, and the mall will be sent.  The query will be executed, but no audit entry will be created nor any mail sent.  The query will be executed, no audit entry will be created but the mall will be sent. NO.57 Examine this parameter In sqinet.ora:SQLNET.ADTHENTICATION_SEBVICES=(NONE)For which two cases do you need a password file?  to authenticate externally Identified users locally  to authenticate nonprivllegcd database users locally  to authenticate administrative privileged users remotely  to authenticate externally Identified users remotely  to authenticate nonprivileged database users remotely  to authenticate administrative privileged users locally NO.58 Examine this query:Why is this account in this status?  The account uses a global authentication.  The user exceeded the value of FAILED_LOGIN _ATTEMPTS and its password has not been reset yet.  The account has the SYSDBA privilege granted.  The user exceeded the value of PASSWORD_LIFE_TIME and Its password has not been reset yet  The ACCOUNTS_ STATUS column is not updated until the user attempts to log in. NO.59 An audit administrator wants to log Client Context variables In the audit trail.Examine this query and the output:  AUDIT CONTEXT NAMESPACE hr_Ct:x ATTRIBUTES hr_app_id NAMESPACE USERENV ATTRIBUTES ALL BY hr;  AUDIT CONTEXT NAMESPACE hr_ctx ATTRIBUTES hr_app_id NAMESPACE USERENV ATTRIBUTES current:_user( db_name BY hr;  CREATE AUDIT POLICY hr_omp_pol ACTIONS UPDATE ON hr.employoes;  AUDIT CONTEXT NAMESPACE hr_ctx ATTRIBUTES hr_app_id, current_user, db_name BY hr  AUDIT POLICY hr_emp_pol BY hr;  CREATE AUDIT POLICY hr_emp_pol ACTIONS SELECT ON hr. employees;  AUDIT POLICY hr_emp_pol EXCEPT hr; NO.60 Which two configurations can be used to protect sensitive data In a database?  setting the SQL92_SECURITy initialization parameter to false  enabling salt tor an encrypted column  creating a procedure that defines the VPD restrictions in a VPD policy  collecting sensitive data Information with Database Security Assessment Tool (DBSAT)  enforcing row-level security at the table level  enforcing row-level security at the database level NO.61 You are required to remove embedded passwords from scripts that connect to database instances. Which tool can be used to implement this requirement?  orapki  netca  dbca  netmgr  mkstore  owm NO.62 You connect to the database Instance over a network to change the password of user scott.Which two methods avoid the new password for user scott from being compromised by network sniffing?  Set the server side sqlnet.ora parameter SQLNET.CRYPTO_CHECKSUM_SERVER-REQUESTED.  Use ALTER USER SCOTT PASSWORD EXPIRE.  Set the server side sqlnet.ora parameter SQLNET.ENCRYPTION_SERVER=REQUESTED.  Use ALTER USER SCOTT IDENTIFIED BY VALUES ‘<value>*.  Use ALTER USER SCOTT IDENTIFIED BY <password>.  Use the SQL”PIus command password SCOTT. NO.63 Which three are true concerning command rules?  System privileges override command rules.  If a command rule’s associated rule set evaluation results In an error, the command is not allowed to execute.  A command can have only one command rule that applies to it.  For DML statement command rules, you can specify a wildcard for the object owner.  If a command rule’s associated rule set Is disabled, then the rule set evaluates to true.  For DML statement command rules, you can specify a wildcard for the object name.  Object privileges override command rules. NO.64 Which CVSS Version 3.1 metric indicates how close an attacker needs to be to the vulnerable component?  Privileges Required  User Interaction  Attack Vector  Scope  Availability  Attack Complexity NO.65 Examine this output:Which three are true?  John must connect as system to perform backup and recovery operations.  John can query dba tables.  John can perform backup and recovery operations by using SQL.  John can perform backup and recovery operations by using RMAN.  John must connect as sys to perform backup and recovery operations.  John Is not able to perform startup and shutdown operations.  John can query other user’s data. NO.66 Examine these commands that execute successfully:What must be done to allow the index to be used?  Use tublespace encryption instead of column encryption.  Add the first_name column to the ix_employee Index to Improve its selectivity.  Create a SQL baseline to preserve the execution plan from before the encryption.  Enable encryption hardware acceleration on the CPUs of the machine. NO.67 Which two statements are true about Valid Node Checking for Registration (VNCR)?  It denies Instance registration through IPC.  It can only be used with Oracle RAC.  It enforces the Listener connectivity through TCPS.  It is a replacement for Class of Secure Transport (COST).  It restricts specific instances from registering with the Listener. NO.68 Which two statements are true about Database Vault rules and rule sets?  You must create a rule set for a rule, before creating the rule.  You con reference Oracle-supplied rules In rule sets that you create.  If a rule set Is disabled. It Is evaluated to true without having Its rules evaluated.  A given rule can be added to only one rule set.  Deleting a rule set also deletes all the rules that have been added to It. NO.69 Database Vault realm r protects all tables In the fin schema from DBA access User fin is configured as the owner in realm R.You must also prevent access to realm r protected tables by user FIN. Which achieves this?  Revoke the select any table privilege from user FIN.  Make realm R a mandatory realm.  Remove the owner authorization of user fin in realm R.  Make user FIN participant In realm r. Instead of owner. NO.70 Using Unified Audit, you must determine who performed an pkan backup ot recovery operations on a database.You are connected as sysdba.Which statement(s) achieve this?A)B)C)D)E)  Option A  Option B  Option C  Option D  Option E NO.71 Which three are part of an access control list (ACL) when using Real Application Security?  privileges  schemas  data realms  column constraints  policies  data realm constraints  roles NO.72 The listener configuration contains these lines related to Valid Node Checking for Registration (VNCR);Which two statements are true?  Both parameters cannot be set at the same time so will be Ignored.  Listener listener will allow instance registration from IP address 192.168.20.2.  Listener listener will allow Instance registration fromREGISTRATION_INVITED_NODES_LISTENEP.  Listener listener will only deny instance registration fromREGISTRATION EXCLUDED NODES LISTENER.  Listener listener will deny instance registration from IP address 192.168.20.2. NO.73 As the SYSKM user you must create the password-based keystore, which will be used for TDE. Examine this list:Identify the sequence that Oracle uses to search for the keystore and its location.  3,5,2,4,1  1,4,5,2  1,2,5,4  1,2,3,5 NO.74 While upgrading your Oracle database server from 10g to 19c, you want to ensure that the users can still connect with their current passwords after the upgrade.What do you need to set explicitly for this purpose?  SQLNET.ALLOWED_LOGON_VERSION_SERVER = 12a in the sqlnet.ora of the new database home  Client net. allowed_lLOGON_VERSION_client must be set to a lower value than the server SQLNET.ALLOWED LOGON. VEBSION .SERVER.  SQLNET.ALLOWED_LOGON_VERSION_client = 8 in the sqlnec.ora file of the client application.  SQLNET.ALLOWED_LOGON_VERSION_sebveb = 8 In the aqlnec.ora of the new database homo. NO.75 You are connected to an Oracle database Instance as a user with privileges to query the hr.employees table.You are not exempt from any reduction policies.Examine this query and result:You implement this Data Redaction policy:You re-execute the select statement.What is the result?A)B)C)D)E)  Option A  Option B  Option C  Option D  Option E  Loading … Oracle 1Z0-116 Pre-Exam Practice Tests | Actualtests4sure: https://www.actualtests4sure.com/1Z0-116-test-questions.html --------------------------------------------------- Images: https://blog.actualtests4sure.com/wp-content/plugins/watu/loading.gif https://blog.actualtests4sure.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-06-09 09:43:59 Post date GMT: 2022-06-09 09:43:59 Post modified date: 2022-06-09 09:43:59 Post modified date GMT: 2022-06-09 09:43:59