Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which two configurations can be used to protect sensitive data In a database?

A.

setting the SQL92_SECURITy initialization parameter to false

B.

enabling salt tor an encrypted column

C.

creating a procedure that defines the VPD restrictions in a VPD policy

D.

collecting sensitive data Information with Database Security Assessment Tool (DBSAT)

E.

enforcing row-level security at the table level

F.

enforcing row-level security at the database level

Examine this command:

What masking definitions does it list?

A.

All with the name credit and the commands to deploy them on all databases with names starting with test.

B.

All with names starting with credit and created on databases with names starting with test.

C.

All with the name credit and created on databases with name starting with teat.

D.

All with names starting with credit and created on any database.

E.

All with the name credit and the commands to deploy them on a database with the name test.

Which two authorization rights does a Database Vault realm owner have that a realm participant does not have?

A.

Add or remove realm-protected objects to or from the reaim.

B.

Grant or revoke privileges on realm-protected objects to or from other users.

C.

Add or remove realm-secured database roles to or from the realm.

D.

Grant or revoke system privileges to access objects protected by the realm.

E.

Add or remove participants to or from the realm.

F.

Add or remove owners to or from the realm.

G.

Grant or revoke realm-secured database roles.

Which statement is true about Network ACLs?

A.

They ate used to control access by users to external network services and resources from the database through PL/SQL.

B.

They are used to provide access to database packages.

C.

They are used to control the usage of UTL_TCP, ITL_HTTP, and UTL_INADDR.

D.

They are used to configure proxy for PL/SQL network utility packages.

Database user SCOTT requires the privilege to select from all tables and you decide to configure this using a global role.

You have not yet configured the database with Enterprise User Security.

You plan to perform these steps:

1. create role GLOBAI._ROI.E identified globally;

2. grant select any table to GLODAL_COLE;

3. grant GLOBAL_ROLE to SCOTT;

What is the result?

A.

All statements succeed even without Enterprise User Security configuration, but the role is not effective.

B.

The third statement falls because global roles can be granted only by using a central authority.

C.

The second statement falls because granting a global role can be completed only by using a central authority.

D.

The first statement falls because the database Is not set up with Enterprise User Security.

Which statement can be used to force password complexity in the password file?

A.

orapwd file=orapwORCL format=12 force-yes

B.

orapwd file=orapwORCL force=yes format=legacy

C.

orapwd file=orapwOPCL forcaat=12

D.

orapwd file=orapwOBCL forroat=12.2

You must rekey encrypted sensitive credential data In your database.

You run the command alter database dictionary rekey credentials.

Which three options ate true about the bkkey process?

A.

Credential Data Is automatically encrypted using aes2S6.

B.

The credential data encryption process does not de-obfuscate the obfuscated passwords before re-encrypts begin.

C.

Both sys. links and sys . SCHEDULER_CREDENTIAL tables are rekeyed.

D.

The rekey process prompts the user to provide a new key algorithm If needed.

E.

The process of rekeylng does not automatically open the keystore.

F.

The rekey process only applies to the sys.ltnks CREDENTUIALS table.

G.

The rekey process only applies to the SYS.SCHEDULES$ credential table.