New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

1z0-116 Questions and Answers

Question # 6

Database user SCOTT requires the privilege to select from all tables and you decide to configure this using a global role.

You have not yet configured the database with Enterprise User Security.

You plan to perform these steps:

1. create role GLOBAI._ROI.E identified globally;

2. grant select any table to GLODAL_COLE;

3. grant GLOBAL_ROLE to SCOTT;

What is the result?

A.

All statements succeed even without Enterprise User Security configuration, but the role is not effective.

B.

The third statement falls because global roles can be granted only by using a central authority.

C.

The second statement falls because granting a global role can be completed only by using a central authority.

D.

The first statement falls because the database Is not set up with Enterprise User Security.

Full Access
Question # 7

Examine this output:

Which three are true?

A.

John must connect as system to perform backup and recovery operations.

B.

John can query dba tables.

C.

John can perform backup and recovery operations by using SQL.

D.

John can perform backup and recovery operations by using RMAN.

E.

John must connect as sys to perform backup and recovery operations.

F.

John Is not able to perform startup and shutdown operations.

G.

John can query other user's data.

Full Access
Question # 8

Examine this command:

What masking definitions does it list?

A.

All with the name credit and the commands to deploy them on all databases with names starting with test.

B.

All with names starting with credit and created on databases with names starting with test.

C.

All with the name credit and created on databases with name starting with teat.

D.

All with names starting with credit and created on any database.

E.

All with the name credit and the commands to deploy them on a database with the name test.

Full Access
Question # 9

Examine these commands and the output used to configure Real Application Security:

What does this output mean?

A.

You treated an access control list that references a non-existent policy.

B.

You created an access control list that references a non-existent realm.

C.

You created a policy that references a non-existent access control list.

D.

You created a realm and an access control list that reference a non-existent policy.

E.

You created a policy that references a non-existent realm.

F.

You created a realm that references a non-existent policy.

Full Access
Question # 10

When creating labels using Oracle Label Security, which is required?

A.

level and group

B.

level, compartment, and group

C.

compartment

D.

group

E.

level

F.

compartment and group

G.

level and compartment

Full Access
Question # 11

For which two reasons would you define Network ACLs?

A.

for configuring fine-grained access control for users and roles that need to access external network services from the database

B.

for configuring fine-grained access control to Oracle wallets to make HTTP requests that require password or client-certificate authentication

C.

to create auditing policies regarding the usage of network services from the database

D.

to block network attacks or denial of service attacks directed at the database

E.

to Improve the performance of the database applications that require access to remote network services

Full Access
Question # 12

Which two configurations can be used to protect sensitive data In a database?

A.

setting the SQL92_SECURITy initialization parameter to false

B.

enabling salt tor an encrypted column

C.

creating a procedure that defines the VPD restrictions in a VPD policy

D.

collecting sensitive data Information with Database Security Assessment Tool (DBSAT)

E.

enforcing row-level security at the table level

F.

enforcing row-level security at the database level

Full Access
Question # 13

Which two are true about auditing in an Oracle Database?

A.

SYS logon operations are always audited In unified auditing.

B.

All SYS operations are audited by default in unified auditing.

C.

No SYS operations are audited by default In unified auditing.

D.

SYS logon operations are always audited in mixed mode auditing.

E.

No SYS operations are audited if audit_sys_operations is set on false in unified auditing.

F.

No SYS operations are audited if audit_sys_operations is set on false in mixed mode auditing.

Full Access