Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

You are required to remove embedded passwords from scripts that connect to database instances. Which tool can be used to implement this requirement?

A.

orapki

B.

netca

C.

dbca

D.

netmgr

E.

mkstore

F.

owm

Which two are true about auditing in an Oracle Database?

A.

SYS logon operations are always audited In unified auditing.

B.

All SYS operations are audited by default in unified auditing.

C.

No SYS operations are audited by default In unified auditing.

D.

SYS logon operations are always audited in mixed mode auditing.

E.

No SYS operations are audited if audit_sys_operations is set on false in unified auditing.

F.

No SYS operations are audited if audit_sys_operations is set on false in mixed mode auditing.

You configured Kerberos authentication for databases running on servers A and B.

However a database link connecting the database on server A to the database on server B fails with ORA-12638 Credential retrieval failed.

Where must you make a change to sqlnet.ora to allow the database link to use its stored credentials Instead of trying to use Kerberos?

A.

on client side of server B

B.

on client side of server A

C.

on server side of server B

D.

on server side of server A

Which two statements are true about Valid Node Checking for Registration (VNCR)?

A.

It denies Instance registration through IPC.

B.

It can only be used with Oracle RAC.

C.

It enforces the Listener connectivity through TCPS.

D.

It is a replacement for Class of Secure Transport (COST).

E.

It restricts specific instances from registering with the Listener.

A database link must be created to connect a source Autonomous Database to target on premises database.

Examine this command:

Which two options are true?

A.

The target database wallet can be uploaded to the data_pctmp_dtr directory.

B.

The db_link_cred parameter stores the password in a wallet.

C.

The db__link__cred references the credential for the username and password for the target database.

D.

The credential_nam£ parameter automatically creates the credential object store.

E.

The database link port Is not correct because It must be restricted to 1521.

F.

Only data_pump_dir directory can be used to store credential wallets.

Database Vault is not used in your installation.

Why is a conventional secure application role more secure than a normal role?

A.

It Is In effect only when configured as a default role for the user.

B.

It requires a password to be set.

C.

It can be set only by a package or procedure that is created with deflner's rights.

D.

It can be set only by users with the grant any bole privilege.

E.

It can be set only by a package or procedure associated with the role definition.

Which CVSS Version 3.1 metric indicates how close an attacker needs to be to the vulnerable component?

A.

Privileges Required

B.

User Interaction

C.

Attack Vector

D.

Scope

E.

Availability

F.

Attack Complexity

Examine this code which executes successfully:

If the IN_OFFICE_ON_WEEKEND rule set returns true for an attempt to connect from Inside the office on weekends, which two are true about the effects of this configuration?

A.

JIM con never connect.

B.

This has no effect on tom's connect attempts.

C.

TOM can never connect.

D.

JIM can only connect when In the office on weekends.

E.

This has no effect on JIM'S connection attempts.

Database Vault is configured and enabled in the database. You create a rule set to enforce security on the hr. employees table.

Examine these requirements:

1. Users working In hr department are allowed to view all rows In HR.EMPLOYEES.

2. hr managers are allowed to view, update, and delete data in In HR.EMPLOYEES.

3. Audit records are to be collected for every evaluation of the rule set.

Which two options are true when creating the rule set?

A.

One rule set contains two rules OR'ed together.

B.

The rule set parameter audit_options must be set to dbms_macutl.g_ruleset_audtt_fail.

C.

The rule set must be defined as is_static.

D.

The rule set parameter eval_options must be set to dbms_macutl.g_ruleset_eval_all.

E.

The rule set parameter audit_options must be set to dbms_macutl.g_buleset_audit_fail + DBMS MACUTL.G RULESET AUDIT SUCCESS.

You are Implementing a security policy that makes use of the USERENV namespace.

Which USERRENV value does not change for the duration of a session?

A.

SESSION_CSER

B.

CURRENT_OSER

C.

CURRENT SCHEMA

D.

CLIENT_INFO