Oracle 1Z0-116 Certification Sample Questions and Answers

1Z0-116 PDF, 1Z0-116 Dumps PDF Free Download, 1Z0-116 Latest Dumps Free PDF, Database Security Administration PDF DumpsThe Oracle Database Security Administration (1Z0-116) Sample Question Set is designed to help you prepare for the Oracle Certified Professional Oracle Database Security Expert certification exam. To become familiar with the actual Oracle Certification exam environment, we suggest you try our Sample Oracle 1Z0-116 Certification Practice Exam.

This Oracle Database Security Administration certification sample practice test and sample question set are designed for evaluation purposes only. If you want to test your Oracle 1Z0-116 knowledge to identify your areas of improvement and get familiar with the actual exam format, we suggest you prepare with the Premium Oracle Certified Professional Oracle Database Security Expert Certification Practice Exam. Our team of Oracle Database Security experts has designed Questions-Answers for this premium practice exam by collecting inputs from recently certified candidates. Our premium Oracle 1Z0-116 certification practice exam will boost your confidence as well as your actual Oracle Database Security Administration exam result.

Oracle 1Z0-116 Sample Questions:

01. If a column is not specified in a Data Redaction Policy, to which column(s) is it applied?
a) columns with any type of constraint
b) none of the columns
c) the primary and foreign key columns
d) the primary key column only
e) foreign key columns only
02. Which tool can be used to monitor and tune database performance in Oracle?
a) SQL Developer
b) Load for Oracle
c) Oracle Application Express
d) Oracle Enterprise Manager Cloud Control
e) SQL*Plus
03. What is true about the client identifier?
a) The client Identifier is automatically set by the SQL-Net layer.
b) The client Identifier is automatically included In the audit trail.
c) A session can have multiple client Identifier values set simultaneously.
d) The client Identifier cannot be changed during the session.
04. For which two reasons would you define Network ACLs?
(Choose two)
a) for configuring fine-grained access control to Oracle wallets to make HTTP requests that require password or client-certificate authentication
b) to Improve the performance of the database applications that require access to remote network services
c) to block network attacks or denial of service attacks directed at the database
d) for configuring fine-grained access control for users and roles that need to access external network services from the database
e) to create auditing policies regarding the usage of network services from the database
05. When querying the database view, VSECRYPTION_WALLET, the status Is OPEN_NO_MASTER _KEY. What does this mean?
a) You do not have select privileges on this database view.
b) The key store is not open.
c) The master key has been corrupted.
d) The master key has not been created.
e) This is expected behavior for this view.
06. You Issue this statement as user SYS:
audit, context namespace kilimanjaro attributes a, b;
Which is true?
a) The statement must be updated to specify which users to audit.
b) The statement will audit all users.
c) The statement will only audit sys.
d) The statement will not audit any users.
07. Which type of attack attempts to find data by repeatedly trying similar SQL with a modified predicate?
a) timing attack
b) Inference attack
c) data remanence attack
d) cache attack
e) side-channel attack
f) known-plaintext attack
08. Database Vault is not used in your installation. Why is a conventional secure application role more secure than a normal role?
a) It Is In effect only when configured as a default role for the user.
b) It can be set only by users with the grant any bole privilege.
c) It can be set only by a package or procedure that is created with deflner's rights.
d) It requires a password to be set.
e) It can be set only by a package or procedure associated with the role definition.
09. What does the Application Data Modeling module of the Oracle Data Masking and Subsetting Pack search for?
a) data redaction policies
b) data masking transformations
c) parent/child relationships between the columns holding sensitive information
d) encrypted columns
10. A policy predicate function Is associated with an enabled Virtual Private Database (VPD) policy for a table. Which two arguments are passed to the function?
(Choose two)
a) the table name
b) the schema owning the table
c) the policy type
d) the policy name
e) the policy group to which the policy belongs


Question: 01

Answer: c

Question: 02

Answer: d

Question: 03

Answer: a

Question: 04

Answer: c, d

Question: 05

Answer: b

Question: 06

Answer: c

Question: 07

Answer: d

Question: 08

Answer: b

Question: 09

Answer: c

Question: 10

Answer: b, d

Rating: 5 / 5 (75 votes)