Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

1z0-116 Oracle Database Security Administration Questions and Answers

Questions 4

You must mask data consistently In three database copies such that data relations across the databases remain In place.

Which Data Masking Format allows this?

Options:

A.

Shuffle

B.

Auto Mask

C.

Array List

D.

Substitute

E.

Random Strings

Buy Now
Questions 5

What does the Application Data Modeling module of the Oracle Data Masking and Subsetting Pack search for?

Options:

A.

data redaction policies

B.

data masking transformations

C.

parent/child relationships between the columns holding sensitive information

D.

encrypted columns

Buy Now
Questions 6

Examine this output:

Which three are true?

Options:

A.

John must connect as system to perform backup and recovery operations.

B.

John can query dba tables.

C.

John can perform backup and recovery operations by using SQL.

D.

John can perform backup and recovery operations by using RMAN.

E.

John must connect as sys to perform backup and recovery operations.

F.

John Is not able to perform startup and shutdown operations.

G.

John can query other user's data.

Buy Now
Questions 7

Examine this command :

GRANT EXEMPT ACCESS POLICY TO PUBLIC;

Which Transparent Sensitive Data Protection functionality will be affected when this command is executed?

Options:

A.

Data Redaction

B.

Bind Masking

C.

Virtual Private Database

D.

Transparent Data Encryption

Buy Now
Questions 8

You must restrict execution of the alter system checkpoint command to certain conditions, specified in a rule set used by a command rule.

Which two parameters must be specified In the dbms_macadm.create_command_rule procedure to do this?

Options:

A.

PARAMETER_NAM£=>'CHECKPOINT'

B.

OBJECT_OWNER=>'SYS

C.

CLAUSE_NAME=>'CHECKPOINT'

D.

CLAUSE_NAME=>'SYSTEM'

E.

COMMANI>=>' ALTER SYSTEM'

F.

OBJECT_NAME=>'CHECKPOINT'

G.

COMMAND=>'ALTER'

Buy Now
Questions 9

Which three authentication methods are available with Centrally Managed Users (CMU)?

Options:

A.

remote Access Services authentication

B.

smart key authentication

C.

public key Infrastructure (PKT) authentication

D.

kerberos authentication

E.

username/password authentication

F.

SSH authentication

Buy Now
Questions 10

Examine these steps:

1. Run the DBSAT Collector

2. Run the DBSAT Discoverer

3. Run the DBSAT Reporter

Identify the minimum required steps for producing a report of schemas with sensitive data.

Options:

A.

1,2

B.

2

C.

1,2,3

D.

2,3

Buy Now
Questions 11

While upgrading your Oracle database server from 10g to 19c, you want to ensure that the users can still connect with their current passwords after the upgrade.

What do you need to set explicitly for this purpose?

Options:

A.

SQLNET.ALLOWED_LOGON_VERSION_SERVER = 12a in the sqlnet.ora of the new database home

B.

Client net. allowed_lLOGON_VERSION_client must be set to a lower value than the server

SQLNET.ALLOWED LOGON. VEBSION .SERVER.

C.

SQLNET.ALLOWED_LOGON_VERSION_client = 8 in the sqlnec.ora file of the client application.

D.

SQLNET.ALLOWED_LOGON_VERSION_sebveb = 8 In the aqlnec.ora of the new database homo.

Buy Now
Questions 12

Database user SCOTT requires the privilege to select from all tables and you decide to configure this using a global role.

You have not yet configured the database with Enterprise User Security.

You plan to perform these steps:

1. create role GLOBAI._ROI.E identified globally;

2. grant select any table to GLODAL_COLE;

3. grant GLOBAL_ROLE to SCOTT;

What is the result?

Options:

A.

All statements succeed even without Enterprise User Security configuration, but the role is not effective.

B.

The third statement falls because global roles can be granted only by using a central authority.

C.

The second statement falls because granting a global role can be completed only by using a central authority.

D.

The first statement falls because the database Is not set up with Enterprise User Security.

Buy Now
Questions 13

What Is the first step when analyzing security within a database?

Options:

A.

Encrypt tablespaces using Transparent Data Encryption

B.

Configure and enable Database Vault

C.

Execute Database Security Assessment Tool (DBSAT)

D.

Mask nonproduction data using Data Masking & Subsetting

E.

Deploy Oracle Key Vault

F.

Create a Data Redaction Policy for your most sensitive tables

Buy Now
Exam Code: 1z0-116
Exam Name: Oracle Database Security Administration
Last Update: Jun 15, 2025
Questions: 90
1z0-116 pdf

1z0-116 PDF

$29.75  $84.99
1z0-116 Engine

1z0-116 Testing Engine

$35  $99.99
1z0-116 PDF + Engine

1z0-116 PDF + Testing Engine

$47.25  $134.99