Oracle 1Z0-528 Exam Questions & Answers



Similar documents
D50323GC20 Oracle Database 11g: Security Release 2

Oracle Database 11g Security Essentials

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

Oracle EXAM - 1Z Oracle Database 11g Security Essentials. Buy Full Product.

Oracle Database 11g: Security Release 2

Oracle Database 11g: Security. What you will learn:

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Securing Data in Oracle Database 12c

Oracle Database 11g: Security

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Oracle Database 11g: Security

<Insert Picture Here> Oracle Database Vault

Oracle Database Security Solutions

<Insert Picture Here> Oracle Database Security Overview

Data Security: Strategy and Tactics for Success

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

ORACLE DATABASE 10G ENTERPRISE EDITION

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security

Oracle Database 11g Comparison Chart

Oracle Database 10g: Security Release 2

An Oracle White Paper June Security and Compliance with Oracle Database 12c

Oracle Database 11g: New Features for Administrators DBA Release 2

Oracle Database 11g: Security

Oracle White Paper October Oracle Advanced Security with Oracle Database 11g Release 2

Oracle Database Security

Oracle 11g New Features - OCP Upgrade Exam

Objectif. Participant. Prérequis. Pédagogie. Oracle Database 11g - New Features for Administrators Release 2. 5 Jours [35 Heures]

Oracle Database 12c: Administration Workshop NEW

Tagging, Encoding, and Encrypting with RMAN

Oracle 11g Database Administration

Oracle Database Security

Oracle Database Security. Paul Needham Senior Director, Product Management Database Security

Oracle Database 12c: Administration Workshop NEW. Duration: 5 Days. What you will learn

Oracle Advanced Security Technical White Paper. An Oracle White Paper June 2007

MySQL Security: Best Practices

Oracle vs. SQL Server. Simon Pane & Steve Recsky First4 Database Partners Inc. September 20, 2012

An Oracle White Paper April Security and Compliance with Oracle Database 12c

<Insert Picture Here> Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region

ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.

All Things Oracle Database Encryption

Database Security Questions HOUG Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

Oracle Database 10g: Administration Workshop II Release 2

D12C-AIU Oracle Database 12c: Admin, Install and Upgrade Accelerated NEW

Database Security. Oracle Database 12c - New Features and Planning Now

FIFTH EDITION. Oracle Essentials. Rick Greenwald, Robert Stackowiak, and. Jonathan Stern O'REILLY" Tokyo. Koln Sebastopol. Cambridge Farnham.

INTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation

UNIVERSITY AUTHORISED EDUCATION PARTNER (WDP)

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Symantec Enterprise Vault.cloud Overview

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption

An Oracle White Paper March Oracle Transparent Data Encryption for SAP

Navigating Endpoint Encryption Technologies

SQL Server 2012 Gives You More Advanced Features (Out-Of-The-Box)

Oracle Database 10g: New Features for Administrators

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Alliance Key Manager Cloud HSM Frequently Asked Questions

05.0 Application Development

ORACLE DATABASE: ADMINISTRATION WORKSHOP I

Oracle. Brief Course Content This course can be done in modular form as per the detail below. ORA-1 Oracle Database 10g: SQL 4 Weeks 4000/-

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Oracle Database Cloud Services OGh DBA & Middleware Day

White Paper BMC Remedy Action Request System Security

Oracle Architecture, Concepts & Facilities

Oracle Database Public Cloud Services

Oracle Database 11g: New Features for Administrators

2: Do not use vendor-supplied defaults for system passwords and other security parameters

Oracle Database. Advanced Security Guide 12c Release 1 (12.1) E

Protecting Data Assets and Reducing Risk

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Microsoft SQL Server Security Best Practices

An Oracle White Paper July Sustainable Compliance for the Payment Card Industry Data Security Standard

What s New in Centrify Server Suite 2015

Microsoft SQL Database Administrator Certification

Making Database Security an IT Security Priority

Oracle Database 12c: Admin, Install and Upgrade Accelerated

SafeNet DataSecure vs. Native Oracle Encryption

Denodo Data Virtualization Security Architecture & Protocols

Why Add Data Masking to Your IBM DB2 Application Environment

What s New with Oracle Database 12c on Windows On-Premises and in the Cloud

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

An Oracle White Paper August Oracle Database Auditing: Performance Guidelines

Security and Control Issues within Relational Databases

ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT

Basic Oracle Database Licensing

Objectif. Participant. Prérequis. Pédagogie. Oracle Database 11g - Administration Workshop I Release 2. 5 Jours [35 Heures]

Transcription:

Oracle 1Z0-528 Exam Questions & Answers Number: 1Z0-528 Passing Score: 660 Time Limit: 120 min File Version: 21.1 http://www.gratisexam.com/ Oracle 1Z0-528 Exam Questions & Answers Exam Name: Oracle Database 11g Security Essentials For Full Set of Questions please visit: http://www.exact-exams.com/1z0-528-exam.htm

Exact-exams QUESTION 1 Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task? A. Database Vault B. Advanced Security Option C. Enterprise Data Masking Pack D. Audit Vault QUESTION 2 Which of the following is NOT a feature of the Data Masking Pack? A. Secure High Performance Mask Execution B. Comprehensive and Extensible Mask Library C. Automated patching for Oracle products and the operating system D. Sophisticated Masking Techniques QUESTION 3 You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task? A. Audit Vault B. Database Vault C. Advanced Security D. Enterprise Manager Data Masking Pack QUESTION 4 You have a system installed with Oracle 11g. You are concerned about the security of the database instances in your system. You plan to use Oracle Database Vault to create several components to manage the security of the database instances. Which of the following components can be created using Oracle Database Vault? Each

correct answer represents a complete solution. Choose all that apply. A. Factors B. Command rules C. Realms D. RMAN Correct Answer: ABC QUESTION 5 Sam works as a Database Administrator for ucertify Inc. The company is using Oracle 11g as the database server. Sam wants to adopt a security feature on the database that enforces the security rules, regardless of the way the data is accessed. Which of the following security features should he adopt to accomplish the task? A. Real Application Cluster (RAC) B. Label Security C. Enhanced security features with execution context D. Virtual Private Database (VPD) QUESTION 6 Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server and deals with the development of various database applications. During such developments, production data is copied into other non-production environments. This leads to several confidential risks. Andrew has been assigned the task to minimize the risk of handling such sensitive information. Which pack of Enterprise Manager should he adopt to accomplish the task? http://www.gratisexam.com/ A. Oracle Diagnostic Pack B. Oracle Data Masking Pack C. Oracle Change Management Pack D. Oracle Configuration Management Pack

QUESTION 7 Which of the following components of Oracle Database Vault is a Java application that is built on top of the Oracle Database Vault PL/SQL application programming interfaces (API)? A. Oracle Database Vault Reporting and Monitoring Tools B. Oracle Database Vault Administrator (DVA) C. Oracle Database Vault DVSYS and DVF Schemas D. Oracle Database Vault Access Control Components QUESTION 8 Which of the following are the advantages of Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply. A. It disables the separation of duty. B. It controls access to database and application data by highly privileged users. C. It imposes multi-factor authorization by the use of flexible business rules. D. It enables the separation of duty. CD QUESTION 9 Which method should be adopted to retrieve all those rows whose sensitive columns have a null value and which are restricted by Virtual Private Database security? A. Column masking B. Access Control List C. Transparent Tablespace Encryption D. Transparent Data Encryption Correct Answer: A QUESTION 10 David works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. David wants to adapt such a security option that will provide no application changes to the database, built-in key management, and high performance to the database. Which security option should he adopt to accomplish the task?

A. Database Vault B. Label Security C. Audit Vault D. Advanced Security Option QUESTION 11 Which of the following options employs labeling concepts used by government and defense organizations to protect sensitive information and to provide data separation? A. Oracle Database Vault Security B. Oracle Advanced Security C. Oracle Audit Vault Security D. Oracle Label Security QUESTION 12 Sam works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. Sam wants to protect the company's data by encrypting the physical data files created on the operating system. Which of the following types of encryption should he use to accomplish the task? A. Transparent Data Encryption (TDE) for securefiles B. Transparent Data Encryption (TDE) for column C. Transparent Data Encryption (TDE) for tablespace D. Network encryption QUESTION 13 You work as a Database Administrator for ucertify Inc. The company uses Oracle 11g on its database server. The server contains a database named "Company_Project_Details". The database is shared among multiple departments of the company for regular updation. Looking at the security issues of the database, you have been assigned the task to apply some security solution to the database. To accomplish the task, you plan to apply Database Label Security on this database. Which of the following components of the Database Label Security should you apply in order to secure this database? Each correct answer represents a complete solution. Choose all that apply. A. Levels B. Source database

C. Compartments D. Groups Correct Answer: ACD QUESTION 14 David works as a Database Administrator for ucertify Inc. The company is using Oracle 11g as the database server. David wants to adopt security options so as to protect the database of the company. Which of the following security options should he adopt to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. Database Vault B. Chain of trust C. Audit Vault D. Advanced Security Option Correct Answer: ACD QUESTION 15 You have a system installed with Oracle 11g. You are concerned about the security of the database instances in your system. You plan to use Oracle Database Vault to create several components to manage the security of the database instances. Which of the following components can be created using Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply. A. RMAN B. Realms C. Factors D. Command rules CD QUESTION 16 Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server and deals with the development of various database applications. During such developments, production data is copied into other non-production environments. This leads to several confidential risks. Andrew has been assigned the task to minimize the risk of handling such sensitive information. Which pack of Enterprise Manager should he adopt to accomplish the task? A. Oracle Diagnostic Pack B. Oracle Configuration Management Pack C. Oracle Data Masking Pack

D. Oracle Change Management Pack QUESTION 17 David works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. David wants to adapt such a security option that will provide no application changes to the database, built-in key management, and high performance to the database. Which security option should he adopt to accomplish the task? A. Database Vault B. Label Security C. Audit Vault D. Advanced Security Option QUESTION 18 You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task? A. Database Vault B. Audit Vault C. Advanced Security D. Enterprise Manager Data Masking Pack Correct Answer: A QUESTION 19 You work as a Security Administrator for ucertify Inc. The company uses Oracle 11g as the database server. You have been asked to use an application that creates public and private key pairs and can be also used for storage and management of certificate authority certificates. Which of the following applications will you use to accomplish this task? A. Oracle Wallet Manager B. Oracle Connection Manager C. Oracle Enterprise Manager D. Oracle Net Manager Correct Answer: A

QUESTION 20 Which of the following security options provides easy compliance by automating access control? A. Oracle Database Vault B. Oracle Data masking Pack C. Oracle Advanced Security D. Oracle Audit Vault QUESTION 21 Which of the following is NOT a feature of the Data Masking Pack? A. Comprehensive and Extensible Mask Library B. Secure High Performance Mask Execution C. Automated patching for Oracle products and the operating system D. Sophisticated Masking Techniques QUESTION 22 David works as a Database Administrator for ucertify Inc. The company is using Oracle 11g as the database server. David wants to adopt security options so as to protect the database of the company. Which of the following security options should he adopt to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. Database Vault B. Advanced Security Option C. Audit Vault D. Chain of trust Correct Answer: ABC QUESTION 23 Which method should be adopted to retrieve all those rows whose sensitive columns have a null value and

which are restricted by Virtual Private Database security? A. Access Control List B. Transparent Data Encryption C. Column masking D. Transparent Tablespace Encryption QUESTION 24 Streams engine decrypt the encrypted data to allow data transformation (character sets, database versions, platforms, etc.) and it is not encrypted at the time it is made transmitted to the other databases. Which of the following types of encryption is needed to resolve this issue? A. Network Encryption B. Transparent Data Encryption C. TDE Tablespace Encryption D. TDE Column Encryption Correct Answer: A QUESTION 25 Andrew works as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Audit Vault security to the database so that alteration or modification of the data is not allowed. Which of the following features are supported by this security option? A. It simplifies compliance reporting. B. It provides encryption technique. C. It helps in early detection of threats. D. It couples fine-grained access control. Correct Answer: AC QUESTION 26 Which of the following are the guidelines of Password Management Policy that enhances the wallet password management module? Each correct answer represents a complete solution. Choose all that apply. A. The minimum password length required is of 8 characters. B. The alphanumeric character mix is required.

C. The minimum password length required is of 6 characters. D. The maximum password length is unlimited. Correct Answer: ABD QUESTION 27 Andrew works as a Database Administrator in Infotech Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Advanced Security for the protection of the database. Its also required to apply authentication methods to authenticate users for the database protection. Which of the following authentication methods should he adopt to accomplish the following task? Each correct answer represents a complete solution. Choose all that apply. A. Kerberos B. RADIUS C. Pre-shared key D. Secure Sockets Layer Correct Answer: ABD QUESTION 28 Which of the following authentication methods supported by Oracle Advanced Security provides the benefit of single sign-on (SSO) capability, to enable users to access multiple accounts and applications with a single password? Each correct answer represents a complete solution. Choose all that apply. A. Kerberos B. Secure Sockets Layer C. Remote Authentication Dial-In User Service D. Entrust/PKI Correct Answer: AD QUESTION 29 You work as a Database Administrator for ucertify Inc. The company uses Oracle 11g on its database server. The server contains a database named "Company_Project_Details". The database is shared among multiple departments of the company for regular updation. Looking at the security issues of the database, you have been assigned the task to apply some security solution to the database. To accomplish the task, you plan to apply Database Label Security on this database. Which of the following components of the Database Label Security should you apply in order to secure this database? Each correct answer represents a complete solution. Choose all that apply. A. Levels

B. Source database C. Groups D. Compartments Correct Answer: ACD QUESTION 30 Sam works as a Database Administrator for ucertify Inc. The company is using Oracle 11g as the database server. Sam wants to adopt a security feature on the database that enforces the security rules, regardless of the way the data is accessed. Which of the following security features should he adopt to accomplish the task? A. Enhanced security features with execution context B. Virtual Private Database (VPD) C. Label Security D. Real Application Cluster (RAC) QUESTION 31 Which of the following tasks is performed by using ALTER SYSTEM SET ENCRYPTION KEY certificate_id IDENTIFIED BY password; SQL command? A. Create table and encrypt column. B. Set or Reset master encryption key C. Set or Reset master encryption key to use PKI certificate D. Encrypts unencrypted existing column QUESTION 32 Sam works as a Database Administrator for Tech-Mart Inc. The company uses an Oracle 11g database server. Andrew wants to secure the data on the network from unauthorized users by encrypting it. Which of the following security option should he use to accomplish the following task? A. Oracle Database Vault B. Oracle Data Masking Pack C. Oracle Advanced Security D. Oracle Audit Vault

QUESTION 33 Which of the following features are required to mask data by making use of Oracle Data Masking Pack? A. Masking definitions B. Masking subnet C. Masking backward D. Masking format libraries QUESTION 34 You work as a Database Administrator for ucertify Inc. The company uses Oracle 11g on its database server. During the management of company's database its required to add encrypted column to existing table for the protection of database files. Which of the following SQL commands will you use to accomplish the following task? A. ALTER TABLE table_name MODIFY (column_name ENCRYPT); B. ALTER SYSTEM SET ENCRYPTION WALLET OPEN IDENTIFIED BY password; C. CREATE TABLE table_name (column_name datatype ENCRYPT); D. ALTER TABLE table_name ADD (column_name datatype ENCRYPT); QUESTION 35 Which of the following are the advantages of Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply. A. It disables the separation of duty. B. It imposes multi-factor authorization by the use of flexible business rules. C. It controls access to database and application data by highly privileged users. D. It enables the separation of duty. CD QUESTION 36

Which of the following features of Oracle Advanced Security Option protects the operating system data files? A. Kerberos B. Transparent Data Encryption C. Network Encryption D. RADIUS QUESTION 37 Sam works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. Sam wants to protect the company's data by encrypting the physical data files created on the operating system. Which of the following types of encryption should he use to accomplish the task? http://www.gratisexam.com/ A. Transparent Data Encryption (TDE) for tablespace B. Network encryption C. Transparent Data Encryption (TDE) for securefiles D. Transparent Data Encryption (TDE) for column Correct Answer: A QUESTION 38 Which of the following components of Oracle Database Vault is a Java application that is built on top of the Oracle Database Vault PL/SQL application programming interfaces (API)? A. Oracle Database Vault Administrator (DVA) B. Oracle Database Vault Access Control Components C. Oracle Database Vault DVSYS and DVF Schemas D. Oracle Database Vault Reporting and Monitoring Tools Correct Answer: A QUESTION 39

Which of the following utilities is used to obtain Kerberos tickets that are cached in the user's credential cache from the key distribution center (KDC)? A. okinit B. orapki C. okdstry D. oklist Correct Answer: A QUESTION 40 Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task? A. Advanced Security Option B. Database Vault C. Audit Vault D. Enterprise Data Masking Pack QUESTION 41 Sam works as an Application Database Administrator for ucertify Inc. The company uses Oracle 11g as the database. Sam uses data masking pack to reduce the risk of handling important information at the time of application development. Which of the following features should Sam hold as an administrator? Each correct answer represents a complete solution. Choose all that apply. A. Engraved with the knowledge of the database objects B. Adds extensions to packaged applications C. Adds additional custom database objects D. Recommends the data to be hidden and protected Correct Answer: ABC QUESTION 42 Which of the following options employs labeling concepts used by government and defense organizations to protect sensitive information and to provide data separation? A. Oracle Database Vault Security

B. Oracle Audit Vault Security C. Oracle Advanced Security D. Oracle Label Security QUESTION 43 Rick works as a Database Administrator in Dolliver Inc. The company uses Oracle 11g on its database server. There is a "customer_detail" table in the database. Rick wants to mask the customer number in the table in such a way that it gets masked to the same value across the entire database. Which masking technique of Data Masking Pack should he apply to accomplish the task? A. Deterministic masking B. Shuffling C. Condition-based masking D. Compound masking Correct Answer: A QUESTION 44 Andrew works as a Database Administrator for Business Software Solutions Ltd. The company uses Oracle 11g as the database. Andrew applied Oracle Data Masking Pack to the database so that to put back the fictitious data in place of sensitive data. Which of the following other benefits can this mask provides to the database? Each correct answer represents a complete solution. Choose all that apply. A. Proactive problem identification. B. Does not affect the production database. C. Increases the productivity of the Database administrator through the masking of sensitive d ata. D. Reduces the risk of handling important information when the production data is copied into a non production environment. CD QUESTION 45 Which of the following features differentiates TDE column encryption from TDE tablespace encryption? Each correct answer represents a complete solution. Choose all that apply. A. The default encryption algorithm for TDE column encryption is AES128 whereas in TDE tablespace encryption it is AES 192. B. In TDE column encryption the encryption candidates are not foreign-key columns whereas in TDE

tablespace encryption they are foreign key columns. C. In TDE column encryption the location of sensitive information is known whereas in TDE tablespace encryption it is known. D. The indexes of encryption candidates are functional indexes in TDE column encryption whereas in TDE tablespace encryption the indexes are normal B-tree indexes. C QUESTION 46 Andrew works as a Database Administrator in Infotech Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Advanced Security for the protection of the database. Its also required to apply authentication methods to authenticate users for the database protection. Which of the following authentication methods should he adopt to accomplish the following task? Each correct answer represents a complete solution. Choose all that apply. A. Pre-shared key B. Secure Sockets Layer C. Kerberos D. RADIUS CD QUESTION 47 Rick works as a Database Administrator in Dolliver Inc. The company uses Oracle 11g on its database server. There is a "customer_detail" table in the database. Rick wants to mask the customer number in the table in such a way that it gets masked to the same value across the entire database. Which masking technique of Data Masking Pack should he apply to accomplish the task? A. Condition-based masking B. Compound masking C. Shuffling D. Deterministic masking QUESTION 48 You have a system installed with Oracle 11g. You are concerned about the security of the database instances in your system. You plan to use Oracle Database Vault to create several components to manage the security of the database instances. Which of the following components can be created using Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply.

A. RMAN B. Factors C. Command rules D. Realms CD QUESTION 49 Which of the following security features are of Oracle Advanced Security that are used to solve the security challenges enhanced by Security in Enterprise Grid Computing Environments, Security in an Intranet or Internet Environment, and Common Security Threats? Each correct answer represents a complete solution. Choose two. A. Protecting Audit data from tampering B. Separation of Duty C. Strong Authentication D. Data Encryption D QUESTION 50 David works as a Database Administrator for ucertify Inc. The company is using Oracle 11g as the database server. David wants to adopt security options so as to protect the database of the company. Which of the following security options should he adopt to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. Advanced Security Option B. Audit Vault C. Chain of trust D. Database Vault Correct Answer: ABD QUESTION 51 Which of the following authentication methods supported by Oracle Advanced Security provides the benefit of single sign-on (SSO) capability, to enable users to access multiple accounts and applications with a single password? Each correct answer represents a complete solution. Choose all that apply. A. Entrust/PKI B. Remote Authentication Dial-In User Service

C. Kerberos D. Secure Sockets Layer Correct Answer: AC QUESTION 52 You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task? A. Advanced Security B. Audit Vault C. Database Vault D. Enterprise Manager Data Masking Pack QUESTION 53 Which of the following features of Oracle Advanced Security Option protects the operating system data files? A. Kerberos B. Network Encryption C. RADIUS D. Transparent Data Encryption QUESTION 54 You work as a Database Administrator for Infotech Inc. The company uses Oracle 11g as its database. The company is required to increase efficiency and lower costs, to automate business processes for which it has to face some security challenges. Which of the following security challenges the company has to face in today's enterprise computing environments? A. Security in Enterprise Grid Computing Environments B. Security in an Intranet or Internet Environment C. Key hiding D. Common Security Threats Correct Answer: ABD

QUESTION 55 Which method should be adopted to retrieve all those rows whose sensitive columns have a null value and which are restricted by Virtual Private Database security? A. Transparent Data Encryption B. Column masking C. Access Control List D. Transparent Tablespace Encryption QUESTION 56 You works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server.it is required to configure the Kerberos authentication on a database client and server. Which of the following tools will you adapt to accomplish this task? A. Oracle Net Manager B. Oracle Wallet Manager C. Oracle Enterprise Manager D. Oracle Connection Manager Correct Answer: A QUESTION 57 Sam works as a Database Administrator for Tech-Mart Inc. The company uses an Oracle 11g database server. Andrew wants to secure the data on the network from unauthorized users by encrypting it. Which of the following security option should he use to accomplish the following task? A. Oracle Audit Vault B. Oracle Advanced Security C. Oracle Data Masking Pack D. Oracle Database Vault QUESTION 58

Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task? A. Advanced Security Option B. Audit Vault C. Database Vault D. Enterprise Data Masking Pack QUESTION 59 Andrew works as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Audit Vault security to the database so that alteration or modification of the data is not allowed. Which of the following features are supported by this security option? A. It simplifies compliance reporting. B. It helps in early detection of threats. C. It couples fine-grained access control. D. It provides encryption technique. Correct Answer: AB QUESTION 60 Sam works as an Application Database Administrator for ucertify Inc. The company uses Oracle 11g as the database. Sam uses data masking pack to reduce the risk of handling important information at the time of application development. Which of the following features should Sam hold as an administrator? Each correct answer represents a complete solution. Choose all that apply. A. Recommends the data to be hidden and protected B. Engraved with the knowledge of the database objects C. Adds additional custom database objects D. Adds extensions to packaged applications CD QUESTION 61 David works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. David wants to adapt such a security option that will provide no application changes to the database, built-in key management, and high performance to the database. Which security option should he adopt to

accomplish the task? A. Label Security B. Advanced Security Option C. Database Vault D. Audit Vault QUESTION 62 Which of the following features are required to mask data by making use of Oracle Data Masking Pack? A. Masking subnet B. Masking definitions C. Masking backward D. Masking format libraries D QUESTION 63 Which of the following are the guidelines of Password Management Policy that enhances the wallet password management module? Each correct answer represents a complete solution. Choose all that apply. A. The alphanumeric character mix is required. B. The minimum password length required is of 6 characters. C. The maximum password length is unlimited. D. The minimum password length required is of 8 characters. Correct Answer: ACD QUESTION 64 Which of the following are the advantages of Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply. A. It controls access to database and application data by highly privileged users. B. It disables the separation of duty. C. It enables the separation of duty. D. It imposes multi-factor authorization by the use of flexible business rules.

Correct Answer: ACD QUESTION 65 You work as a Security Administrator for ucertify Inc. The company uses Oracle 11g as the database server. You have been asked to use an application that creates public and private key pairs and can be also used for storage and management of certificate authority certificates. Which of the following applications will you use to accomplish this task? A. Oracle Connection Manager B. Oracle Net Manager C. Oracle Wallet Manager D. Oracle Enterprise Manager QUESTION 66 Sam works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. Sam wants to protect the company's data by encrypting the physical data files created on the operating system. Which of the following types of encryption should he use to accomplish the task? A. Transparent Data Encryption (TDE) for securefiles B. Transparent Data Encryption (TDE) for tablespace C. Network encryption D. Transparent Data Encryption (TDE) for column QUESTION 67 Which of the following tasks is performed by using ALTER SYSTEM SET ENCRYPTION KEY certificate_id IDENTIFIED BY password; SQL command? A. Encrypts unencrypted existing column B. Set or Reset master encryption key C. Create table and encrypt column. D. Set or Reset master encryption key to use PKI certificate

QUESTION 68 You work as a Database Administrator for ucertify Inc. The company uses Oracle 11g on its database server. The server contains a database named "Company_Project_Details". The database is shared among multiple departments of the company for regular updation. Looking at the security issues of the database, you have been assigned the task to apply some security solution to the database. To accomplish the task, you plan to apply Database Label Security on this database. Which of the following components of the Database Label Security should you apply in order to secure this database? Each correct answer represents a complete solution. Choose all that apply. A. Source database B. Levels C. Groups D. Compartments CD QUESTION 69 Which of the following features differentiates TDE column encryption from TDE tablespace encryption? Each correct answer represents a complete solution. Choose all that apply. A. In TDE column encryption the location of sensitive information is known whereas in TDE tablespace encryption it is known. B. In TDE column encryption the encryption candidates are not foreign-key columns whereas in TDE ablespace encryption they are foreign key columns. C. The default encryption algorithm for TDE column encryption is AES128 whereas in TDE tablespace ncryption it is AES 192. D. The indexes of encryption candidates are functional indexes in TDE column encryption whereas in DE tablespace encryption the indexes are normal B-tree indexes. Correct Answer: AB QUESTION 70 You work as a Database Administrator for ucertify Inc. The company uses Oracle 11g on its atabase server. During the management of company's database its required to add encrypted olumn to existing table for the protection of database files. Which of the following SQL commands ill you use to accomplish the following task? A. ALTER SYSTEM SET ENCRYPTION WALLET OPEN IDENTIFIED BY password; B. ALTER TABLE table_name ADD (column_name datatype ENCRYPT); C. CREATE TABLE table_name (column_name datatype ENCRYPT); D. ALTER TABLE table_name MODIFY (column_name ENCRYPT);

QUESTION 71 Streams engine decrypt the encrypted data to allow data transformation (character sets, database ersions, platforms, etc.) and it is not encrypted at the time it is made transmitted to the other atabases. Which of the following types of encryption is needed to resolve this issue? A. Transparent Data Encryption B. TDE Column Encryption C. Network Encryption D. TDE Tablespace Encryption QUESTION 72 Sam works as a Database Administrator for ucertify Inc. The company is using Oracle 11g as the database server. Sam wants to adopt a security feature on the database that enforces the security rules, regardless of the way the data is accessed. Which of the following security features should he adopt to accomplish the task? A. Real Application Cluster (RAC) B. Virtual Private Database (VPD) C. Enhanced security features with execution context D. Label Security QUESTION 73 Which of the following is NOT a feature of the Data Masking Pack? A. Automated patching for Oracle products and the operating system B. Sophisticated Masking Techniques C. Secure High Performance Mask Execution D. Comprehensive and Extensible Mask Library Correct Answer: A QUESTION 74 Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database

server and deals with the development of various database applications. During such developments, production data is copied into other non-production environments. This leads to several confidential risks. Andrew has been assigned the task to minimize the risk of handling such sensitive information. Which pack of Enterprise Manager should he adopt to accomplish the task? A. Oracle Configuration Management Pack B. Oracle Diagnostic Pack C. Oracle Change Management Pack D. Oracle Data Masking Pack QUESTION 75 Which of the following options employs labeling concepts used by government and defense organizations to protect sensitive information and to provide data separation? A. Oracle Advanced Security B. Oracle Audit Vault Security C. Oracle Database Vault Security D. Oracle Label Security QUESTION 76 Which of the following utilities is used to obtain Kerberos tickets that are cached in the user's credential cache from the key distribution center (KDC)? A. oklist B. okinit C. okdstry D. orapki QUESTION 77 Andrew works as a Database Administrator for Business Software Solutions Ltd. The company uses Oracle 11g as the database. Andrew applied Oracle Data Masking Pack to the database so that to put back the fictitious data in place of sensitive data. Which of the following other benefits can this mask provides to the database? Each correct answer represents a complete solution. Choose all that apply.

A. Proactive problem identification. B. Increases the productivity of the Database administrator through the masking of sensitive d ata. C. Reduces the risk of handling important information when the production data is copied into a non production environment. D. Does not affect the production database. CD QUESTION 78 Which of the following components of Oracle Database Vault is a Java application that is built on top of the Oracle Database Vault PL/SQL application programming interfaces (API)? A. Oracle Database Vault DVSYS and DVF Schemas B. Oracle Database Vault Reporting and Monitoring Tools C. Oracle Database Vault Access Control Components D. Oracle Database Vault Administrator (DVA) QUESTION 79 Which of the following security options provides easy compliance by automating access control? A. Oracle Audit Vault B. Oracle Database Vault C. Oracle Data masking Pack D. Oracle Advanced Security Correct Answer: A QUESTION 80 Which of the following features is supported by Oracle Label Security? A. It provides advanced spatial analysis features for complex geographic information systems (GIS) applications. B. It provides static and dynamic caching of Oracle database tables. C. It provides sophisticated and flexible security based on row labels for fine-grained access c ontrol. D. It provides scalable performance as the demand for database throughput grows.

QUESTION 81 Which of the following database options provides multi-level security? A. Oracle On-Line Analytical Processing B. Oracle Partitioning C. Oracle Label Security D. Oracle Real Application Clusters QUESTION 82 Which of the following security options provides the encryption of disk-based backups of the database? A. Oracle Enterprise Manager B. Oracle Database Vault C. Oracle Audit Vault D. Oracle Advanced QUESTION 83 Which security feature should be used in the environment where multiple users access the same database and only specific information is available to each group? A. Column masking B. Label Security C. Virtual Private Database D. Audit Vault

http://www.gratisexam.com/ QUESTION 84 Which testing can help customers to implement database changes with minimum risk? A. Real Application Testing B. Networked Application Testing C. Cloud Application Testing D. Unit Testing Correct Answer: A QUESTION 85 Which of the following is a feature of the Operating system audit log collection (OSAUD)? A. It retrieves audit records from fine-grained audit trails. B. It uses Oracle LogMiner and Streams to retrieve logical change records (LCRs) from the redo log files. C. It retrieves audit records from the database audit trail. D. It retrieves audit records from the OS audit file. QUESTION 86 Which of the following is an Oracle Audit Vault Server component? A. Audit Vault Auditor B. Oracle Database C. Audit Data Collection D. SQL Server QUESTION 87

Which of the following features is supported by Oracle Audit Vault? A. Hardware Security Module (HSM) TDE Master Key Protection B. Lower IT costs with audit policies C. Transport Layer Security (TLS) Support D. SSL/TLS network encryption QUESTION 88 Which of the following security products builds customer reports against an open warehouse schema? A. Oracle Database Vault Security B. Oracle Label Security C. Oracle Audit Vault Security D. Oracle Advanced Security QUESTION 89 Which of the following components includes Oracle Container for J2EE (OC4J) and Oracle Database Client components, and is deployed within its own directory? A. Audit Vault Server B. Audit Vault Collector C. Audit Vault Agent D. Audit Vault Console QUESTION 90 Which of the following types of encryption is used to encrypt data in flight with native encryption? A. Network encryption B. Transparent data encryption C. Endpoint encryption D. Transparent tablespace encryption Correct Answer: A

QUESTION 91 Which of the following encryption algorithms is used by transparent data encryption by default? A. 3DES168 B. AES128 C. AES256 D. AES192 QUESTION 92 Which of the following is the container in which transparent data encryption stores the master key? A. Role B. Realm C. Schema D. Wallet QUESTION 93 Which of the following commands is used to load the master encryption key after the database is restarted? A. ALTER SYSTEM SET ENCRYPTION WALLET OPEN IDENTIFIED B. ALTER SYSTEM SET ENCRYPTION WALLET OPEN IDENTIFIED BY password C. ALTER SYSTEM SET ENCRYPTION KEY IDENTIFIED BY password D. ALTER SYSTEM SET ENCRYPTION WALLET CLOSE QUESTION 94 Which of the following features differentiates tablespace encryption from column encryption? A. It is completely transparent to the application. B. It allows index range scans on data.

C. It protects data in undo and redo logs. D. Its master encryption key is stored in the Oracle wallet. QUESTION 95 Which of the following roles or privileges is created during installation and used for creating new database accounts? A. SYSDBA B. DV_OWNER C. SYSOPER D. DV_ACCTMGR QUESTION 96 Which of the following is a functional grouping of database schemas and roles that must be secured for a given application? A. Role B. Schema C. Realm D. Wallet QUESTION 97 Which of the following components involves command rule granularity? A. Multi-Factor Authorization B. Realms C. Reporting D. Auditing Correct Answer: A

QUESTION 98 Which of the following tasks is assigned to the database administrator while using database vault? A. Account management B. Resource management C. Security responsibilities D. System management QUESTION 99 Which of the following regulations addresses unauthorized access to data? A. Basel II - Internal Risk Management B. Payment Card Industry Data Security Standard (PCI DSS) C. Sarbanes-Oxley Section 409 D. Gramm-Leach-Bliley Correct Answer: A QUESTION 100 Which of the following Enterprise Manager Packs supports masking and script generation? A. Oracle Tuning B. Oracle Change Management C. Oracle Configuration Management D. Oracle Data Masking QUESTION 101 Which of the following packs involves condition-based, deterministic, and compound masking echniques? A. Oracle Provisioning B. Oracle Tuning C. Oracle Data Masking D. Oracle Configuration Management

QUESTION 102 Which of the following is an advantage of Data Masking Pack? A. Automatically maintained workload history facilitates historical performance analysis. B. Provides automatic tuning of SQL statements. C. Eliminate errors by automating deployment of database changes across environments. D. Rapid sharing of production data in compliance with data privacy regulations. QUESTION 103 Which of the following packs has the Clone and Mask workflow feature? A. Oracle Data Masking B. Oracle Provisioning and Patch Automation C. Oracle Tuning Pack D. Oracle Change Management Correct Answer: A QUESTION 104 Which of the following options defines a data masking operation to be implemented on one or more tables in a database? A. Masking format libraries B. Data Masking Workflow C. Masking definition D. Automatic Storage Management QUESTION 105 Andrew works as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Audit Vault security to the database so that alteration or modification of the data is

not allowed. Which of the following features are supported by this security option? A. It helps in early detection of threats. B. It provides encryption technique. C. It simplifies compliance reporting. D. It couples fine-grained access control. Correct Answer: AC QUESTION 106 Which method should be adopted to retrieve all those rows whose sensitive columns have a null value and which are restricted by Virtual Private Database security? A. Transparent Tablespace Encryption B. Access Control List C. Transparent Data Encryption D. Column masking QUESTION 107 Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task? A. Enterprise Data Masking Pack B. Audit Vault C. Database Vault D. Advanced Security Option QUESTION 108 Andrew works as a Database Administrator for Business Software Solutions Ltd. The company uses Oracle 11g as the database. Andrew applied Oracle Data Masking Pack to the database so that to put back the fictitious data in place of sensitive data. Which of the following other benefits can this mask provides to the database? Each correct answer represents a complete solution. Choose all that apply. A. Proactive problem identification.

B. Increases the productivity of the Database administrator through the masking of sensitive d ata. C. Reduces the risk of handling important information when the production data is copied into a non production environment. D. Does not affect the production database. CD QUESTION 109 Which of the following features are required to mask data by making use of Oracle Data Masking Pack? A. Masking subnet B. Masking backward C. Masking format libraries D. Masking definitions D QUESTION 110 Which of the following features differentiates TDE column encryption from TDE tablespace encryption? Each correct answer represents a complete solution. Choose all that apply. A. In TDE column encryption the location of sensitive information is known whereas in TDE tablespace encryption it is known. B. In TDE column encryption the encryption candidates are not foreign-key columns whereas in TDE tablespace encryption they are foreign key columns. C. The default encryption algorithm for TDE column encryption is AES128 whereas in TDE tablespace encryption it is AES 192. D. The indexes of encryption candidates are functional indexes in TDE column encryption whereas in TDE tablespace encryption the indexes are normal B-tree indexes. Correct Answer: AB QUESTION 111 Which of the following options employs labeling concepts used by government and defense organizations to protect sensitive information and to provide data separation? A. Oracle Audit Vault Security B. Oracle Advanced Security C. Oracle Database Vault Security D. Oracle Label Security

QUESTION 112 Sam works as a Database Administrator for Tech-Mart Inc. The company uses an Oracle 11g database server. Andrew wants to secure the data on the network from unauthorized users by encrypting it. Which of the following security option should he use to accomplish the following task? A. Oracle Audit Vault B. Oracle Data Masking Pack C. Oracle Advanced Security D. Oracle Database Vault QUESTION 113 Sam works as an Application Database Administrator for ucertify Inc. The company uses Oracle 11g as the database. Sam uses data masking pack to reduce the risk of handling important information at the time of application development. Which of the following features should Sam hold as an administrator? Each correct answer represents a complete solution. Choose all that apply. A. Adds extensions to packaged applications B. Recommends the data to be hidden and protected C. Engraved with the knowledge of the database objects D. Adds additional custom database objects Correct Answer: ACD QUESTION 114 You works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server.it is required to configure the Kerberos authentication on a database client and server. Which of the following tools will you adapt to accomplish this task? A. Oracle Wallet Manager B. Oracle Connection Manager C. Oracle Net Manager D. Oracle Enterprise Manager

QUESTION 115 Which of the following security features are of Oracle Advanced Security that are used to solve the security challenges enhanced by Security in Enterprise Grid Computing Environments, Security in an Intranet or Internet Environment, and Common Security Threats? Each correct answer represents a complete solution. Choose two. A. Protecting Audit data from tampering B. Separation of Duty C. Strong Authentication D. Data Encryption D QUESTION 116 Streams engine decrypt the encrypted data to allow data transformation (character sets, database versions, platforms, etc.) and it is not encrypted at the time it is made transmitted to the other databases. Which of the following types of encryption is needed to resolve this issue? A. TDE Tablespace Encryption B. Network Encryption C. TDE Column Encryption D. Transparent Data Encryption QUESTION 117 Sam works as a Database Administrator for ucertify Inc. The company is using Oracle 11g as the database server. Sam wants to adopt a security feature on the database that enforces the security rules, regardless of the way the data is accessed. Which of the following security features should he adopt to accomplish the task? A. Enhanced security features with execution context B. Virtual Private Database (VPD) C. Real Application Cluster (RAC) D. Label Security

QUESTION 118 Which of the following tasks is performed by using ALTER SYSTEM SET ENCRYPTION KEY certificate_id IDENTIFIED BY password; SQL command? A. Set or Reset master encryption key to use PKI certificate B. Encrypts unencrypted existing column C. Create table and encrypt column. D. Set or Reset master encryption key Correct Answer: A QUESTION 119 Sam works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. Sam wants to protect the company's data by encrypting the physical data files created on the operating system. Which of the following types of encryption should he use to accomplish the task? A. Network encryption B. Transparent Data Encryption (TDE) for tablespace C. Transparent Data Encryption (TDE) for column D. Transparent Data Encryption (TDE) for securefiles QUESTION 120 Rick works as a Database Administrator in Dolliver Inc. The company uses Oracle 11g on its database server. There is a "customer_detail" table in the database. Rick wants to mask the customer number in the table in such a way that it gets masked to the same value across the entire database. Which masking technique of Data Masking Pack should he apply to accomplish the task? A. Condition-based masking B. Compound masking C. Shuffling D. Deterministic masking QUESTION 121 You work as a Database Administrator for ucertify Inc. The company uses Oracle 11g on its database server. The server contains a database named "Company_Project_Details". The database is shared among multiple departments of the company for regular updation. Looking at the security issues of the database, you have been assigned the task to apply some security solution to the database.

To accomplish the task, you plan to apply Database Label Security on this database. Which of the following components of the Database Label Security should you apply in order to secure this database? Each correct answer represents a complete solution. Choose all that apply. A. Groups B. Levels C. Source database D. Compartments Correct Answer: ABD QUESTION 122 David works as a Database Administrator for ucertify Inc. The company is using Oracle 11g as the database server. David wants to adopt security options so as to protect the database of the company. Which of the following security options should he adopt to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. Audit Vault B. Advanced Security Option C. Database Vault D. Chain of trust Correct Answer: ABC QUESTION 123 You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task? A. Audit Vault B. Enterprise Manager Data Masking Pack C. Database Vault D. Advanced Security QUESTION 124 Which of the following are the guidelines of Password Management Policy that enhances the wallet password management module? Each correct answer represents a complete solution. Choose all that apply.

A. The maximum password length is unlimited. B. The minimum password length required is of 6 characters. C. The alphanumeric character mix is required. D. The minimum password length required is of 8 characters. Correct Answer: ACD QUESTION 125 Which of the following security options provides easy compliance by automating access control? A. Oracle Database Vault B. Oracle Data masking Pack C. Oracle Advanced Security D. Oracle Audit Vault QUESTION 126 Rick works as a Database Administrator in Dolliver Inc. The company uses Oracle 11g on its database server. There is a "customer_detail" table in the database. Rick wants to mask the customer number in the table in such a way that it gets masked to the same value across the entire database. Which masking technique of Data Masking Pack should he apply to accomplish the task? A. Condition-based masking B. Compound masking C. Shuffling D. Deterministic masking QUESTION 127 Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task? A. Database Vault B. Advanced Security Option C. Enterprise Data Masking Pack D. Audit Vault

QUESTION 128 Which of the following is NOT a feature of the Data Masking Pack? A. Secure High Performance Mask Execution B. Comprehensive and Extensible Mask Library C. Automated patching for Oracle products and the operating system D. Sophisticated Masking Techniques QUESTION 129 You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task? A. Audit Vault B. Database Vault C. Advanced Security D. Enterprise Manager Data Masking Pack QUESTION 130 Which of the following is NOT a feature of the Data Masking Pack? A. Automated patching for Oracle products and the operating system B. Sophisticated Masking Techniques C. Secure High Performance Mask Execution D. Comprehensive and Extensible Mask Library Correct Answer: A QUESTION 131

Which of the following security options provides easy compliance by automating access control? A. Oracle Audit Vault B. Oracle Database Vault C. Oracle Data masking Pack D. Oracle Advanced Security Correct Answer: A QUESTION 132 Which of the following are the advantages of Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply. A. It disables the separation of duty. B. It controls access to database and application data by highly privileged users. C. It imposes multi-factor authorization by the use of flexible business rules. D. It enables the separation of duty. CD QUESTION 133 Andrew works as a Database Administrator in Infotech Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Advanced Security for the protection of the database. Its also required to apply authentication methods to authenticate users for the database protection. Which of the following authentication methods should he adopt to accomplish the following task? Each correct answer represents a complete solution. Choose all that apply. A. Pre-shared key B. Secure Sockets Layer C. Kerberos D. RADIUS CD QUESTION 134 Which testing can help customers to implement database changes with minimum risk? A. Real Application Testing B. Networked Application Testing C. Cloud Application Testing

D. Unit Testing Correct Answer: A QUESTION 135 Which of the following features differentiates TDE column encryption from TDE tablespace encryption? Each correct answer represents a complete solution. Choose all that apply. A. In TDE column encryption the location of sensitive information is known whereas in TDE tablespace encryption it is known. B. In TDE column encryption the encryption candidates are not foreign-key columns whereas in TDE tablespace encryption they are foreign key columns. C. The default encryption algorithm for TDE column encryption is AES128 whereas in TDE tablespace encryption it is AES 192. D. The indexes of encryption candidates are functional indexes in TDE column encryption whereas in TDE tablespace encryption the indexes are normal B-tree indexes. Correct Answer: AB QUESTION 136 You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task? A. Audit Vault B. Database Vault C. Advanced Security D. Enterprise Manager Data Masking Pack http://www.gratisexam.com/