You are on page 1of 41

Oracle_RealExamQuestions.

Com_1Z0-528_v2011-11-09_135q_By-Charlie
Number: 1Z0-528 Passing Score: 660 Time Limit : 120 min File Version: 2011-11-09 Exam : Oracle_RealExamQuestions.Com_1Z0-528 Ver :2011-11-09 Question : 135 Old questions are modified and new question-answers are also uploaded for the exam preperation with more understandable examples. good luck By-Charlie

Exam A QUESTION 1 Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task? A. B. C. D. Database Vault Advanced Security Option Enterprise Data Masking Pack Audit Vault

Answer: D Section: (none) Explanation/Reference:

QUESTION 2 Which of the following is NOT a feature of the Data Masking Pack? A. B. C. D. Secure High Performance Mask Execution Comprehensive and Extensible Mask Library Automated patching for Oracle products and the operating system Sophisticated Masking Techniques

Answer: C Section: (none) Explanation/Reference:

QUESTION 3 You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task? A. B. C. D. Audit Vault Database Vault Advanced Security Enterprise Manager Data Masking Pack

Answer: B Section: (none) Explanation/Reference:

QUESTION 4 You have a system installed with Oracle 11g. You are concerned about the security of the database instances in your system. You plan to use Oracle Database Vault to create several components to manage the security of the database instances. Which of the following components can be created using Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply.

A. B. C. D.

Factors Command rules Realms RMAN

Answer: ABC Section: (none) Explanation/Reference:

QUESTION 5 Sam works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. Sam wants to adopt a security feature on the database that enforces the security rules, regardless of the way the data is accessed. Which of the following security features should he adopt to accomplish the task? A. B. C. D. Real Application Cluster (RAC) Label Security Enhanced security features with execution context Virtual Private Database (VPD)

Answer: D Section: (none) Explanation/Reference:

QUESTION 6 Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server and deals with the development of various database applications. During such developments, production data is copied into other non-production environments. This leads to several confidential risks. Andrew has been assigned the task to minimize the risk of handling such sensitive information. Which pack of Enterprise Manager should he adopt to accomplish the task? A. B. C. D. Oracle Diagnostic Pack Oracle Data Masking Pack Oracle Change Management Pack Oracle Configuration Management Pack

Answer: B Section: (none) Explanation/Reference:

QUESTION 7 Which of the following components of Oracle Database Vault is a Java application that is built on top of the Oracle Database Vault PL/SQL application programming interfaces (API)? A. Oracle Database Vault Reporting and Monitoring Tools B. Oracle Database Vault Administrator (DVA) C. Oracle Database Vault DVSYS and DVF Schemas

D. Oracle Database Vault Access Control Components Answer: B Section: (none) Explanation/Reference:

QUESTION 8 Which of the following are the advantages of Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. It disables the separation of duty. It controls access to database and application data by highly privileged users. It imposes multi-factor authorization by the use of flexible business rules. It enables the separation of duty.

Answer: BCD Section: (none) Explanation/Reference:

QUESTION 9 Which method should be adopted to retrieve all those rows whose sensitive columns have a null value and which are restricted by Virtual Private Database security? A. B. C. D. Column masking Access Control List Transparent Tablespace Encryption Transparent Data Encryption

Answer: A Section: (none) Explanation/Reference:

QUESTION 10 David works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. David wants to adapt such a security option that will provide no application changes to the database, built-in key management, and high performance to the database. Which security option should he adopt to accomplish the task? A. B. C. D. Database Vault Label Security Audit Vault Advanced Security Option

Answer: D Section: (none) Explanation/Reference:

QUESTION 11 Which of the following options employs labeling concepts used by government and defense organizations to protect sensitive information and to provide data separation? A. B. C. D. Oracle Database Vault Security Oracle Advanced Security Oracle Audit Vault Security Oracle Label Security

Answer: D Section: (none) Explanation/Reference:

QUESTION 12 Sam works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. Sam wants to protect the company's data by encrypting the physical data files created on the operating system. Which of the following types of encryption should he use to accomplish the task? A. B. C. D. Transparent Data Encryption (TDE) for securefiles Transparent Data Encryption (TDE) for column Transparent Data Encryption (TDE) for tablespace Network encryption

Answer: C Section: (none) Explanation/Reference:

QUESTION 13 You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its database server. The server contains a database named "Company_Project_Details". The database is shared among multiple departments of the company for regular updation. Looking at the security issues of the database, you have been assigned the task to apply some security solution to the database. To accomplish the task, you plan to apply Database Label Security on this database. Which of the following components of the Database Label Security should you apply in order to secure this database? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. Levels Source database Compartments Groups

Answer: ACD Section: (none) Explanation/Reference:

QUESTION 14 David works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. David wants to adopt security options so as to protect the database of the company.

Which of the following security options should he adopt to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. Database Vault Chain of trust Audit Vault Advanced Security Option

Answer: ACD Section: (none) Explanation/Reference:

QUESTION 15 You have a system installed with Oracle 11g. You are concerned about the security of the database instances in your system. You plan to use Oracle Database Vault to create several components to manage the security of the database instances. Which of the following components can be created using Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. RMAN Realms Factors Command rules

Answer: BCD Section: (none) Explanation/Reference:

QUESTION 16 Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server and deals with the development of various database applications. During such developments, production data is copied into other non-production environments. This leads to several confidential risks. Andrew has been assigned the task to minimize the risk of handling such sensitive information. Which pack of Enterprise Manager should he adopt to accomplish the task? A. B. C. D. Oracle Diagnostic Pack Oracle Configuration Management Pack Oracle Data Masking Pack Oracle Change Management Pack

Answer: C Section: (none) Explanation/Reference:

QUESTION 17 David works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. David wants to adapt such a security option that will provide no application changes to the database, built-in key management, and high performance to the database. Which security option should he adopt to accomplish the task?

A. B. C. D.

Database Vault Label Security Audit Vault Advanced Security Option

Answer: D Section: (none) Explanation/Reference:

QUESTION 18 You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task? A. B. C. D. Database Vault Audit Vault Advanced Security Enterprise Manager Data Masking Pack

Answer: A Section: (none) Explanation/Reference:

QUESTION 19 You work as a Security Administrator for uCertify Inc. The company uses Oracle 11g as the database server. You have been asked to use an application that creates public and private key pairs and can be also used for storage and management of certificate authority certificates. Which of the following applications will you use to accomplish this task? A. B. C. D. Oracle Wallet Manager Oracle Connection Manager Oracle Enterprise Manager Oracle Net Manager

Answer: A Section: (none) Explanation/Reference:

QUESTION 20 Which of the following security options provides easy compliance by automating access control? A. B. C. D. Oracle Database Vault Oracle Data masking Pack Oracle Advanced Security Oracle Audit Vault

Answer: D

Section: (none) Explanation/Reference:

QUESTION 21 Which of the following is NOT a feature of the Data Masking Pack? A. B. C. D. Comprehensive and Extensible Mask Library Secure High Performance Mask Execution Automated patching for Oracle products and the operating system Sophisticated Masking Techniques

Answer: C Section: (none) Explanation/Reference:

QUESTION 22 David works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. David wants to adopt security options so as to protect the database of the company. Which of the following security options should he adopt to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. Database Vault Advanced Security Option Audit Vault Chain of trust

Answer: ABC Section: (none) Explanation/Reference:

QUESTION 23 Which method should be adopted to retrieve all those rows whose sensitive columns have a null value and which are restricted by Virtual Private Database security? A. B. C. D. Access Control List Transparent Data Encryption Column masking Transparent Tablespace Encryption

Answer: C Section: (none) Explanation/Reference:

QUESTION 24 Streams engine decrypt the encrypted data to allow data transformation (character sets, database versions, platforms, etc.) and it is not encrypted at the time it is made transmitted to the other databases.

Which of the following types of encryption is needed to resolve this issue? A. B. C. D. Network Encryption Transparent Data Encryption TDE Tablespace Encryption TDE Column Encryption

Answer: A Section: (none) Explanation/Reference:

QUESTION 25 Andrew works as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Audit Vault security to the database so that alteration or modification of the data is not allowed. Which of the following features are supported by this security option? A. B. C. D. It simplifies compliance reporting. It provides encryption technique. It helps in early detection of threats. It couples fine-grained access control.

Answer: AC Section: (none) Explanation/Reference:

QUESTION 26 Which of the following are the guidelines of Password Management Policy that enhances the wallet password management module? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. The minimum password length required is of 8 characters. The alphanumeric character mix is required. The minimum password length required is of 6 characters. The maximum password length is unlimited.

Answer: ABD Section: (none) Explanation/Reference:

QUESTION 27 Andrew works as a Database Administrator in Infotech Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Advanced Security for the protection of the database. Its also required to apply authentication methods to authenticate users for the database protection. Which of the following authentication methods should he adopt to accomplish the following task? Each correct answer represents a complete solution. Choose all that apply. A. Kerberos B. RADIUS

C. Pre-shared key D. Secure Sockets Layer Answer: ABD Section: (none) Explanation/Reference:

QUESTION 28 Which of the following authentication methods supported by Oracle Advanced Security provides the benefit of single sign-on (SSO) capability, to enable users to access multiple accounts and applications with a single password? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. Kerberos Secure Sockets Layer Remote Authentication Dial-In User Service Entrust/PKI

Answer: AD Section: (none) Explanation/Reference:

QUESTION 29 You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its database server. The server contains a database named "Company_Project_Details". The database is shared among multiple departments of the company for regular updation. Looking at the security issues of the database, you have been assigned the task to apply some security solution to the database. To accomplish the task, you plan to apply Database Label Security on this database. Which of the following components of the Database Label Security should you apply in order to secure this database? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. Levels Source database Groups Compartments

Answer: ACD Section: (none) Explanation/Reference:

QUESTION 30 Sam works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. Sam wants to adopt a security feature on the database that enforces the security rules, regardless of the way the data is accessed. Which of the following security features should he adopt to accomplish the task? A. B. C. D. Enhanced security features with execution context Virtual Private Database (VPD) Label Security Real Application Cluster (RAC)

Answer: B Section: (none) Explanation/Reference:

QUESTION 31 Which of the following tasks is performed by using ALTER SYSTEM SET ENCRYPTION KEY certificate_ID IDENTIFIED BY password; SQL command? A. B. C. D. Create table and encrypt column. Set or Reset master encryption key Set or Reset master encryption key to use PKI certificate Encrypts unencrypted existing column

Answer: C Section: (none) Explanation/Reference:

QUESTION 32 Sam works as a Database Administrator for Tech-Mart Inc. The company uses an Oracle 11g database server. Andrew wants to secure the data on the network from unauthorized users by encrypting it. Which of the following security option should he use to accomplish the following task? A. B. C. D. Oracle Database Vault Oracle Data Masking Pack Oracle Advanced Security Oracle Audit Vault

Answer: C Section: (none) Explanation/Reference:

QUESTION 33 Which of the following features are required to mask data by making use of Oracle Data Masking Pack ? A. B. C. D. Masking definitions Masking subnet Masking backward Masking format libraries

Answer: D Section: (none) Explanation/Reference:

QUESTION 34 You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its database

server. During the management of company's database its required to add encrypted column to existing table for the protection of database files. Which of the following SQL commands will you use to accomplish the following task? A. B. C. D. ALTER TABLE table_name MODIFY (column_name ENCRYPT); ALTER SYSTEM SET ENCRYPTION WALLET OPEN IDENTIFIED BY password; CREATE TABLE table_name (column_name datatype ENCRYPT); ALTER TABLE table_name ADD (column_name datatype ENCRYPT);

Answer: D Section: (none) Explanation/Reference:

QUESTION 35 Which of the following are the advantages of Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. It disables the separation of duty. It imposes multi-factor authorization by the use of flexible business rules. It controls access to database and application data by highly privileged users. It enables the separation of duty.

Answer: BCD Section: (none) Explanation/Reference:

QUESTION 36 Which of the following features of Oracle Advanced Security Option protects the operating system data files? A. B. C. D. Kerberos Transparent Data Encryption Network Encryption RADIUS

Answer: B Section: (none) Explanation/Reference:

QUESTION 37 Sam works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. Sam wants to protect the company's data by encrypting the physical data files created on the operating system. Which of the following types of encryption should he use to accomplish the task? A. B. C. D. Transparent Data Encryption (TDE) for tablespace Network encryption Transparent Data Encryption (TDE) for securefiles Transparent Data Encryption (TDE) for column

Answer: A Section: (none) Explanation/Reference:

QUESTION 38 Which of the following components of Oracle Database Vault is a Java application that is built on top of the Oracle Database Vault PL/SQL application programming interfaces (API)? A. B. C. D. Oracle Database Vault Administrator (DVA) Oracle Database Vault Access Control Components Oracle Database Vault DVSYS and DVF Schemas Oracle Database Vault Reporting and Monitoring Tools

Answer: A Section: (none) Explanation/Reference:

QUESTION 39 Which of the following utilities is used to obtain Kerberos tickets that are cached in the user's credential cache from the key distribution center (KDC)? A. B. C. D. okinit orapki okdstry oklist

Answer: A Section: (none) Explanation/Reference:

QUESTION 40 Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task? A. B. C. D. Advanced Security Option Database Vault Audit Vault Enterprise Data Masking Pack

Answer: C Section: (none) Explanation/Reference:

QUESTION 41 Sam works as an Application Database Administrator for uCertify Inc. The company uses Oracle 11g as the database. Sam uses data masking pack to reduce the risk of handling important information at the time of application development. Which of the following features should Sam hold as an administrator? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. Engraved with the knowledge of the database objects Adds extensions to packaged applications Adds additional custom database objects Recommends the data to be hidden and protected

Answer: ABC Section: (none) Explanation/Reference:

QUESTION 42 Which of the following options employs labeling concepts used by government and defense organizations to protect sensitive information and to provide data separation? A. B. C. D. Oracle Database Vault Security Oracle Audit Vault Security Oracle Advanced Security Oracle Label Security

Answer: D Section: (none) Explanation/Reference:

QUESTION 43 Rick works as a Database Administrator in Dolliver Inc. The company uses Oracle 11g on its database server. There is a "customer_detail" table in the database. Rick wants to mask the customer number in the table in such a way that it gets masked to the same value across the entire database. Which masking technique of Data Masking Pack should he apply to accomplish the task? A. B. C. D. Deterministic masking Shuffling Condition-based masking Compound masking

Answer: A Section: (none) Explanation/Reference:

QUESTION 44 Andrew works as a Database Administrator for Business Software Solutions Ltd. The company uses Oracle 11g as the database. Andrew applied Oracle Data Masking Pack to the database so that to put back the fictitious data in place of sensitive data. Which of the following other benefits can this mask provides to the database? Each correct answer represents a complete solution. Choose all that apply.

A. B. C. D.

Proactive problem identification. Does not affect the production database. Increases the productivity of the Database administrator through the masking of sensitive d ata. Reduces the risk of handling important information when the production data is copied into a non production environment.

Answer: BCD Section: (none) Explanation/Reference:

QUESTION 45 Which of the following features differentiates TDE column encryption from TDE tablespace encryption? Each correct answer represents a complete solution. Choose all that apply. A. The default encryption algorithm for TDE column encryption is AES128 whereas in TDE tablespace encryption it is AES 192 . B. In TDE column encryption the encryption candidates are not foreign-key columns whereas in TDE tablespace encryption they are foreign key columns. C. In TDE column encryption the location of sensitive information is known whereas in TDE tablespace encryption it is known. D. The indexes of encryption candidates are functional indexes in TDE column encryption whereas in TDE tablespace encryption the indexes are normal B-tree indexes. Answer: BC Section: (none) Explanation/Reference:

QUESTION 46 Andrew works as a Database Administrator in Infotech Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Advanced Security for the protection of the database. Its also required to apply authentication methods to authenticate users for the database protection. Which of the following authentication methods should he adopt to accomplish the following task? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. Pre-shared key Secure Sockets Layer Kerberos RADIUS

Answer: BCD Section: (none) Explanation/Reference:

QUESTION 47 Rick works as a Database Administrator in Dolliver Inc. The company uses Oracle 11g on its database server. There is a "customer_detail" table in the database. Rick wants to mask the customer number in the table in such a way that it gets masked to the same value across the entire database. Which masking technique of Data Masking Pack should he apply to accomplish the task?

A. B. C. D.

Condition-based masking Compound masking Shuffling Deterministic masking

Answer: D Section: (none) Explanation/Reference:

QUESTION 48 You have a system installed with Oracle 11g. You are concerned about the security of the database instances in your system. You plan to use Oracle Database Vault to create several components to manage the security of the database instances. Which of the following components can be created using Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. RMAN Factors Command rules Realms

Answer: BCD Section: (none) Explanation/Reference:

QUESTION 49 Which of the following security features are of Oracle Advanced Security that are used to solve the security challenges enhanced by Security in Enterprise Grid Computing Environments, Security in an Intranet or Internet Environment, and Common Security Threats? Each correct answer represents a complete solution. Choose two. A. B. C. D. Protecting Audit data from tampering Separation of Duty Strong Authentication Data Encryption

Answer: CD Section: (none) Explanation/Reference:

QUESTION 50 David works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. David wants to adopt security options so as to protect the database of the company. Which of the following security options should he adopt to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. Advanced Security Option B. Audit Vault

C. Chain of trust D. Database Vault Answer: ABD Section: (none) Explanation/Reference:

QUESTION 51 Which of the following authentication methods supported by Oracle Advanced Security provides the benefit of single sign-on (SSO) capability, to enable users to access multiple accounts and applications with a single password? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. Entrust/PKI Remote Authentication Dial-In User Service Kerberos Secure Sockets Layer

Answer: AC Section: (none) Explanation/Reference:

QUESTION 52 You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task? A. B. C. D. Advanced Security Audit Vault Database Vault Enterprise Manager Data Masking Pack

Answer: C Section: (none) Explanation/Reference:

QUESTION 53 Which of the following features of Oracle Advanced Security Option protects the operating system data files? A. B. C. D. Kerberos Network Encryption RADIUS Transparent Data Encryption

Answer: D Section: (none) Explanation/Reference:

QUESTION 54 You work as a Database Administrator for Infotech Inc. The company uses Oracle 11g as its database. The company is required to increase efficiency and lower costs, to automate business processes for which it has to face some security challenges. Which of the following security challenges the company has to face in today's enterprise computing environments? A. B. C. D. Security in Enterprise Grid Computing Environments Security in an Intranet or Internet Environment Key hiding Common Security Threats

Answer: ABD Section: (none) Explanation/Reference:

QUESTION 55 Which method should be adopted to retrieve all those rows whose sensitive columns have a null value and which are restricted by Virtual Private Database security? A. B. C. D. Transparent Data Encryption Column masking Access Control List Transparent Tablespace Encryption

Answer: B Section: (none) Explanation/Reference:

QUESTION 56 You works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server .It is required to configure the Kerberos authentication on a database client and server. Which of the following tools will you adapt to accomplish this task? A. B. C. D. Oracle Net Manager Oracle Wallet Manager Oracle Enterprise Manager Oracle Connection Manager

Answer: A Section: (none) Explanation/Reference:

QUESTION 57 Sam works as a Database Administrator for Tech-Mart Inc. The company uses an Oracle 11g database server. Andrew wants to secure the data on the network from unauthorized users by encrypting it. Which of the following security option should he use to accomplish the following task?

A. B. C. D.

Oracle Audit Vault Oracle Advanced Security Oracle Data Masking Pack Oracle Database Vault

Answer: B Section: (none) Explanation/Reference:

QUESTION 58 Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task? A. B. C. D. Advanced Security Option Audit Vault Database Vault Enterprise Data Masking Pack

Answer: B Section: (none) Explanation/Reference:

QUESTION 59 Andrew works as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Audit Vault security to the database so that alteration or modification of the data is not allowed. Which of the following features are supported by this security option? A. B. C. D. It simplifies compliance reporting. It helps in early detection of threats. It couples fine-grained access control. It provides encryption technique.

Answer: AB Section: (none) Explanation/Reference:

QUESTION 60 Sam works as an Application Database Administrator for uCertify Inc. The company uses Oracle 11g as the database. Sam uses data masking pack to reduce the risk of handling important information at the time of application development. Which of the following features should Sam hold as an administrator? Each correct answer represents a complete solution. Choose all that apply. A. Recommends the data to be hidden and protected B. Engraved with the knowledge of the database objects C. Adds additional custom database objects

D. Adds extensions to packaged applications Answer: BCD Section: (none) Explanation/Reference:

QUESTION 61 David works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. David wants to adapt such a security option that will provide no application changes to the database, built-in key management, and high performance to the database. Which security option should he adopt to accomplish the task? A. B. C. D. Label Security Advanced Security Option Database Vault Audit Vault

Answer: B Section: (none) Explanation/Reference:

QUESTION 62 Which of the following features are required to mask data by making use of Oracle Data Masking Pack ? A. B. C. D. Masking subnet Masking definitions Masking backward Masking format libraries

Answer: BD Section: (none) Explanation/Reference:

QUESTION 63 Which of the following are the guidelines of Password Management Policy that enhances the wallet password management module? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. The alphanumeric character mix is required. The minimum password length required is of 6 characters. The maximum password length is unlimited. The minimum password length required is of 8 characters.

Answer: ACD Section: (none) Explanation/Reference:

QUESTION 64 Which of the following are the advantages of Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. It controls access to database and application data by highly privileged users. It disables the separation of duty. It enables the separation of duty. It imposes multi-factor authorization by the use of flexible business rules.

Answer: ACD Section: (none) Explanation/Reference:

QUESTION 65 You work as a Security Administrator for uCertify Inc. The company uses Oracle 11g as the database server. You have been asked to use an application that creates public and private key pairs and can be also used for storage and management of certificate authority certificates. Which of the following applications will you use to accomplish this task? A. B. C. D. Oracle Connection Manager Oracle Net Manager Oracle Wallet Manager Oracle Enterprise Manager

Answer: C Section: (none) Explanation/Reference:

QUESTION 66 Sam works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. Sam wants to protect the company's data by encrypting the physical data files created on the operating system. Which of the following types of encryption should he use to accomplish the task? A. B. C. D. Transparent Data Encryption (TDE) for securefiles Transparent Data Encryption (TDE) for tablespace Network encryption Transparent Data Encryption (TDE) for column

Answer: B Section: (none) Explanation/Reference:

QUESTION 67 Which of the following tasks is performed by using ALTER SYSTEM SET ENCRYPTION KEY certificate_ID IDENTIFIED BY password; SQL command? A. Encrypts unencrypted existing column B. Set or Reset master encryption key

C. Create table and encrypt column. D. Set or Reset master encryption key to use PKI certificate Answer: D Section: (none) Explanation/Reference:

QUESTION 68 You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its database server. The server contains a database named "Company_Project_Details". The database is shared among multiple departments of the company for regular updation. Looking at the security issues of the database, you have been assigned the task to apply some security solution to the database. To accomplish the task, you plan to apply Database Label Security on this database. Which of the following components of the Database Label Security should you apply in order to secure this database? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. Source database Levels Groups Compartments

Answer: BCD Section: (none) Explanation/Reference:

QUESTION 69 Which of the following features differentiates TDE column encryption from TDE tablespace encryption? Each correct answer represents a complete solution. Choose all that apply. A. In TDE column encryption the location of sensitive information is known whereas in TDE tablespace encryption it is known. B. In TDE column encryption the encryption candidates are not foreign-key columns whereas in TDE ablespace encryption they are foreign key columns. C. The default encryption algorithm for TDE column encryption is AES128 whereas in TDE tablespace ncryption it is AES 192 . D. The indexes of encryption candidates are functional indexes in TDE column encryption whereas in DE tablespace encryption the indexes are normal B-tree indexes. Answer: AB Section: (none) Explanation/Reference:

QUESTION 70 You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its atabase server. During the management of company's database its required to add encrypted olumn to existing table for the protection of database files. Which of the following SQL commands ill you use to accomplish the following task? A. ALTER SYSTEM SET ENCRYPTION WALLET OPEN IDENTIFIED BY password;

B. ALTER TABLE table_name ADD (column_name datatype ENCRYPT); C. CREATE TABLE table_name (column_name datatype ENCRYPT); D. ALTER TABLE table_name MODIFY (column_name ENCRYPT); Answer: B Section: (none) Explanation/Reference:

QUESTION 71 Streams engine decrypt the encrypted data to allow data transformation (character sets, database ersions, platforms, etc.) and it is not encrypted at the time it is made transmitted to the other atabases. Which of the following types of encryption is needed to resolve this issue? A. B. C. D. Transparent Data Encryption TDE Column Encryption Network Encryption TDE Tablespace Encryption

Answer: C Section: (none) Explanation/Reference:

QUESTION 72 Sam works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. Sam wants to adopt a security feature on the database that enforces the security rules, regardless of the way the data is accessed. Which of the following security features should he adopt to accomplish the task? A. B. C. D. Real Application Cluster (RAC) Virtual Private Database (VPD) Enhanced security features with execution context Label Security

Answer: B Section: (none) Explanation/Reference:

QUESTION 73 Which of the following is NOT a feature of the Data Masking Pack? A. B. C. D. Automated patching for Oracle products and the operating system Sophisticated Masking Techniques Secure High Performance Mask Execution Comprehensive and Extensible Mask Library

Answer: A Section: (none)

Explanation/Reference:

QUESTION 74 Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server and deals with the development of various database applications. During such developments, production data is copied into other non-production environments. This leads to several confidential risks. Andrew has been assigned the task to minimize the risk of handling such sensitive information. Which pack of Enterprise Manager should he adopt to accomplish the task? A. B. C. D. Oracle Configuration Management Pack Oracle Diagnostic Pack Oracle Change Management Pack Oracle Data Masking Pack

Answer: D Section: (none) Explanation/Reference:

QUESTION 75 Which of the following options employs labeling concepts used by government and defense organizations to protect sensitive information and to provide data separation? A. B. C. D. Oracle Advanced Security Oracle Audit Vault Security Oracle Database Vault Security Oracle Label Security

Answer: D Section: (none) Explanation/Reference:

QUESTION 76 Which of the following utilities is used to obtain Kerberos tickets that are cached in the user's credential cache from the key distribution center (KDC)? A. B. C. D. oklist okinit okdstry orapki

Answer: B Section: (none) Explanation/Reference:

QUESTION 77 Andrew works as a Database Administrator for Business Software Solutions Ltd. The company uses Oracle 11g as the database. Andrew applied Oracle Data Masking Pack to the database so that to put

back the fictitious data in place of sensitive data. Which of the following other benefits can this mask provides to the database? Each correct answer represents a complete solution. Choose all that apply. A. Proactive problem identification. B. Increases the productivity of the Database administrator through the masking of sensitive d ata. C. Reduces the risk of handling important information when the production data is copied into a non production environment. D. Does not affect the production database. Answer: BCD Section: (none) Explanation/Reference:

QUESTION 78 Which of the following components of Oracle Database Vault is a Java application that is built on top of the Oracle Database Vault PL/SQL application programming interfaces (API)? A. B. C. D. Oracle Database Vault DVSYS and DVF Schemas Oracle Database Vault Reporting and Monitoring Tools Oracle Database Vault Access Control Components Oracle Database Vault Administrator (DVA)

Answer: D Section: (none) Explanation/Reference:

QUESTION 79 Which of the following security options provides easy compliance by automating access control? A. B. C. D. Oracle Audit Vault Oracle Database Vault Oracle Data masking Pack Oracle Advanced Security

Answer: A Section: (none) Explanation/Reference:

QUESTION 80 Which of the following features is supported by Oracle Label Security? A. It provides advanced spatial analysis features for complex geographic information systems (GIS) applications. B. It provides static and dynamic caching of Oracle database tables. C. It provides sophisticated and flexible security based on row labels for fine-grained access c ontrol. D. It provides scalable performance as the demand for database throughput grows.

Answer: C Section: (none) Explanation/Reference:

QUESTION 81 Which of the following database options provides multi-level security? A. B. C. D. Oracle On-Line Analytical Processing Oracle Partitioning Oracle Label Security Oracle Real Application Clusters

Answer: C Section: (none) Explanation/Reference:

QUESTION 82 Which of the following security options provides the encryption of disk-based backups of the database? A. B. C. D. Oracle Enterprise Manager Oracle Database Vault Oracle Audit Vault Oracle Advanced

Answer: D Section: (none) Explanation/Reference:

QUESTION 83 Which security feature should be used in the environment where multiple users access the same database and only specific information is available to each group? A. B. C. D. Column masking Label Security Virtual Private Database Audit Vault

Answer: C Section: (none) Explanation/Reference:

QUESTION 84 Which testing can help customers to implement database changes with minimum risk? A. Real Application Testing B. Networked Application Testing

C. Cloud Application Testing D. Unit Testing Answer: A Section: (none) Explanation/Reference:

QUESTION 85 Which of the following is a feature of the Operating system audit log collection (OSAUD)? A. B. C. D. It retrieves audit records from fine-grained audit trails. It uses Oracle LogMiner and Streams to retrieve logical change records (LCRs) from the redo log files. It retrieves audit records from the database audit trail. It retrieves audit records from the OS audit file.

Answer: D Section: (none) Explanation/Reference:

QUESTION 86 Which of the following is an Oracle Audit Vault Server component? A. B. C. D. Audit Vault Auditor Oracle Database Audit Data Collection SQL Server

Answer: C Section: (none) Explanation/Reference:

QUESTION 87 Which of the following features is supported by Oracle Audit Vault? A. B. C. D. Hardware Security Module (HSM) TDE Master Key Protection Lower IT costs with audit policies Transport Layer Security (TLS) Support SSL/TLS network encryption

Answer: B Section: (none) Explanation/Reference:

QUESTION 88 Which of the following security products builds customer reports against an open warehouse schema?

A. B. C. D.

Oracle Database Vault Security Oracle Label Security Oracle Audit Vault Security Oracle Advanced Security

Answer: C Section: (none) Explanation/Reference:

QUESTION 89 Which of the following components includes Oracle Container for J2EE (OC4J) and Oracle Database Client components, and is deployed within its own directory? A. B. C. D. Audit Vault Server Audit Vault Collector Audit Vault Agent Audit Vault Console

Answer: C Section: (none) Explanation/Reference:

QUESTION 90 Which of the following types of encryption is used to encrypt data in flight with native encryption? A. B. C. D. Network encryption Transparent data encryption Endpoint encryption Transparent tablespace encryption

Answer: A Section: (none) Explanation/Reference:

QUESTION 91 Which of the following encryption algorithms is used by transparent data encryption by default? A. B. C. D. 3DES168 AES128 AES256 AES192

Answer: D Section: (none) Explanation/Reference:

QUESTION 92 Which of the following is the container in which transparent data encryption stores the master key? A. B. C. D. Role Realm Schema Wallet

Answer: D Section: (none) Explanation/Reference:

QUESTION 93 Which of the following commands is used to load the master encryption key after the database is restarted? A. B. C. D. ALTER SYSTEM SET ENCRYPTION WALLET OPEN IDENTIFIED ALTER SYSTEM SET ENCRYPTION WALLET OPEN IDENTIFIED BY password ALTER SYSTEM SET ENCRYPTION KEY IDENTIFIED BY password ALTER SYSTEM SET ENCRYPTION WALLET CLOSE

Answer: B Section: (none) Explanation/Reference:

QUESTION 94 Which of the following features differentiates tablespace encryption from column encryption? A. B. C. D. It is completely transparent to the application. It allows index range scans on data. It protects data in undo and redo logs. Its master encryption key is stored in the Oracle wallet.

Answer: B Section: (none) Explanation/Reference:

QUESTION 95 Which of the following roles or privileges is created during installation and used for creating new database accounts? A. B. C. D. SYSDBA DV_OWNER SYSOPER DV_ACCTMGR

Answer: D

Section: (none) Explanation/Reference:

QUESTION 96 Which of the following is a functional grouping of database schemas and roles that must be secured for a given application? A. B. C. D. Role Schema Realm Wallet

Answer: C Section: (none) Explanation/Reference:

QUESTION 97 Which of the following components involves command rule granularity? A. B. C. D. Multi-Factor Authorization Realms Reporting Auditing

Answer: A Section: (none) Explanation/Reference:

QUESTION 98 Which of the following tasks is assigned to the database administrator while using database vault? A. B. C. D. Account management Resource management Security responsibilities System management

Answer: B Section: (none) Explanation/Reference:

QUESTION 99 Which of the following regulations addresses unauthorized access to data? A. Basel II - Internal Risk Management B. Payment Card Industry Data Security Standard (PCI DSS)

C. Sarbanes-Oxley Section 409 D. Gramm-Leach-Bliley Answer: A Section: (none) Explanation/Reference:

QUESTION 100 Which of the following Enterprise Manager Packs supports masking and script generation? A. B. C. D. Oracle Tuning Oracle Change Management Oracle Configuration Management Oracle Data Masking

Answer: D Section: (none) Explanation/Reference:

QUESTION 101 Which of the following packs involves condition-based, deterministic, and compound masking echniques? A. B. C. D. Oracle Provisioning Oracle Tuning Oracle Data Masking Oracle Configuration Management

Answer: C Section: (none) Explanation/Reference:

QUESTION 102 Which of the following is an advantage of Data Masking Pack? A. B. C. D. Automatically maintained workload history facilitates historical performance analysis. Provides automatic tuning of SQL statements. Eliminate errors by automating deployment of database changes across environments. Rapid sharing of production data in compliance with data privacy regulations.

Answer: D Section: (none) Explanation/Reference:

QUESTION 103 Which of the following packs has the Clone and Mask workflow feature?

A. B. C. D.

Oracle Data Masking Oracle Provisioning and Patch Automation Oracle Tuning Pack Oracle Change Management

Answer: A Section: (none) Explanation/Reference:

QUESTION 104 Which of the following options defines a data masking operation to be implemented on one or more tables in a database? A. B. C. D. Masking format libraries Data Masking Workflow Masking definition Automatic Storage Management

Answer: C Section: (none) Explanation/Reference:

QUESTION 105 Andrew works as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Audit Vault security to the database so that alteration or modification of the data is not allowed. Which of the following features are supported by this security option? A. B. C. D. It helps in early detection of threats. It provides encryption technique. It simplifies compliance reporting. It couples fine-grained access control.

Answer: AC Section: (none) Explanation/Reference:

QUESTION 106 Which method should be adopted to retrieve all those rows whose sensitive columns have a null value and which are restricted by Virtual Private Database security? A. B. C. D. Transparent Tablespace Encryption Access Control List Transparent Data Encryption Column masking

Answer: D Section: (none)

Explanation/Reference:

QUESTION 107 Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task? A. B. C. D. Enterprise Data Masking Pack Audit Vault Database Vault Advanced Security Option

Answer: B Section: (none) Explanation/Reference:

QUESTION 108 Andrew works as a Database Administrator for Business Software Solutions Ltd. The company uses Oracle 11g as the database. Andrew applied Oracle Data Masking Pack to the database so that to put back the fictitious data in place of sensitive data. Which of the following other benefits can this mask provides to the database? Each correct answer represents a complete solution. Choose all that apply. A. Proactive problem identification. B. Increases the productivity of the Database administrator through the masking of sensitive d ata. C. Reduces the risk of handling important information when the production data is copied into a non production environment. D. Does not affect the production database. Answer: BCD Section: (none) Explanation/Reference:

QUESTION 109 Which of the following features are required to mask data by making use of Oracle Data Masking Pack ? A. B. C. D. Masking subnet Masking backward Masking format libraries Masking definitions

Answer: CD Section: (none) Explanation/Reference:

QUESTION 110

Which of the following features differentiates TDE column encryption from TDE tablespace encryption? Each correct answer represents a complete solution. Choose all that apply. A. In TDE column encryption the location of sensitive information is known whereas in TDE tablespace encryption it is known. B. In TDE column encryption the encryption candidates are not foreign-key columns whereas in TDE tablespace encryption they are foreign key columns. C. The default encryption algorithm for TDE column encryption is AES128 whereas in TDE tablespace encryption it is AES 192 . D. The indexes of encryption candidates are functional indexes in TDE column encryption whereas in TDE tablespace encryption the indexes are normal B-tree indexes. Answer: AB Section: (none) Explanation/Reference:

QUESTION 111 Which of the following options employs labeling concepts used by government and defense organizations to protect sensitive information and to provide data separation? A. B. C. D. Oracle Audit Vault Security Oracle Advanced Security Oracle Database Vault Security Oracle Label Security

Answer: D Section: (none) Explanation/Reference:

QUESTION 112 Sam works as a Database Administrator for Tech-Mart Inc. The company uses an Oracle 11g database server. Andrew wants to secure the data on the network from unauthorized users by encrypting it. Which of the following security option should he use to accomplish the following task? A. B. C. D. Oracle Audit Vault Oracle Data Masking Pack Oracle Advanced Security Oracle Database Vault

Answer: C Section: (none) Explanation/Reference:

QUESTION 113 Sam works as an Application Database Administrator for uCertify Inc. The company uses Oracle 11g as the database. Sam uses data masking pack to reduce the risk of handling important information at the time of application development. Which of the following features should Sam hold as an administrator? Each correct answer represents a complete solution. Choose all that apply.

A. B. C. D.

Adds extensions to packaged applications Recommends the data to be hidden and protected Engraved with the knowledge of the database objects Adds additional custom database objects

Answer: ACD Section: (none) Explanation/Reference:

QUESTION 114 You works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server .It is required to configure the Kerberos authentication on a database client and server. Which of the following tools will you adapt to accomplish this task? A. B. C. D. Oracle Wallet Manager Oracle Connection Manager Oracle Net Manager Oracle Enterprise Manager

Answer: C Section: (none) Explanation/Reference:

QUESTION 115 Which of the following security features are of Oracle Advanced Security that are used to solve the security challenges enhanced by Security in Enterprise Grid Computing Environments, Security in an Intranet or Internet Environment, and Common Security Threats? Each correct answer represents a complete solution. Choose two. A. B. C. D. Protecting Audit data from tampering Separation of Duty Strong Authentication Data Encryption

Answer: CD Section: (none) Explanation/Reference:

QUESTION 116 Streams engine decrypt the encrypted data to allow data transformation (character sets, database versions, platforms, etc.) and it is not encrypted at the time it is made transmitted to the other databases. Which of the following types of encryption is needed to resolve this issue? A. B. C. D. TDE Tablespace Encryption Network Encryption TDE Column Encryption Transparent Data Encryption

Answer: B Section: (none) Explanation/Reference:

QUESTION 117 Sam works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. Sam wants to adopt a security feature on the database that enforces the security rules, regardless of the way the data is accessed. Which of the following security features should he adopt to accomplish the task? A. B. C. D. Enhanced security features with execution context Virtual Private Database (VPD) Real Application Cluster (RAC) Label Security

Answer: B Section: (none) Explanation/Reference:

QUESTION 118 Which of the following tasks is performed by using ALTER SYSTEM SET ENCRYPTION KEY certificate_ID IDENTIFIED BY password; SQL command? A. B. C. D. Set or Reset master encryption key to use PKI certificate Encrypts unencrypted existing column Create table and encrypt column. Set or Reset master encryption key

Answer: A Section: (none) Explanation/Reference:

QUESTION 119 Sam works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. Sam wants to protect the company's data by encrypting the physical data files created on the operating system. Which of the following types of encryption should he use to accomplish the task? A. B. C. D. Network encryption Transparent Data Encryption (TDE) for tablespace Transparent Data Encryption (TDE) for column Transparent Data Encryption (TDE) for securefiles

Answer: B Section: (none) Explanation/Reference:

QUESTION 120 Rick works as a Database Administrator in Dolliver Inc. The company uses Oracle 11g on its database server. There is a "customer_detail" table in the database. Rick wants to mask the customer number in the table in such a way that it gets masked to the same value across the entire database. Which masking technique of Data Masking Pack should he apply to accomplish the task? A. B. C. D. Condition-based masking Compound masking Shuffling Deterministic masking

Answer: D Section: (none) Explanation/Reference:

QUESTION 121 You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its database server. The server contains a database named "Company_Project_Details". The database is shared among multiple departments of the company for regular updation. Looking at the security issues of the database, you have been assigned the task to apply some security solution to the database. To accomplish the task, you plan to apply Database Label Security on this database. Which of the following components of the Database Label Security should you apply in order to secure this database? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. Groups Levels Source database Compartments

Answer: ABD Section: (none) Explanation/Reference:

QUESTION 122 David works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. David wants to adopt security options so as to protect the database of the company. Which of the following security options should he adopt to accomplish the task? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. Audit Vault Advanced Security Option Database Vault Chain of trust

Answer: ABC Section: (none) Explanation/Reference:

QUESTION 123

You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task? A. B. C. D. Audit Vault Enterprise Manager Data Masking Pack Database Vault Advanced Security

Answer: C Section: (none) Explanation/Reference:

QUESTION 124 Which of the following are the guidelines of Password Management Policy that enhances the wallet password management module? Each correct answer represents a complete solution. Choose all that apply. A. B. C. D. The maximum password length is unlimited. The minimum password length required is of 6 characters. The alphanumeric character mix is required. The minimum password length required is of 8 characters.

Answer: ACD Section: (none) Explanation/Reference:

QUESTION 125 Which of the following security options provides easy compliance by automating access control? A. B. C. D. Oracle Database Vault Oracle Data masking Pack Oracle Advanced Security Oracle Audit Vault

Answer: D Section: (none) Explanation/Reference:

QUESTION 126 Rick works as a Database Administrator in Dolliver Inc. The company uses Oracle 11g on its database server. There is a "customer_detail" table in the database. Rick wants to mask the customer number in the table in such a way that it gets masked to the same value across the entire database. Which masking technique of Data Masking Pack should he apply to accomplish the task? A. Condition-based masking B. Compound masking

C. Shuffling D. Deterministic masking Answer: D Section: (none) Explanation/Reference:

QUESTION 127 Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task? A. B. C. D. Database Vault Advanced Security Option Enterprise Data Masking Pack Audit Vault

Answer: D Section: (none) Explanation/Reference:

QUESTION 128 Which of the following is NOT a feature of the Data Masking Pack? A. B. C. D. Secure High Performance Mask Execution Comprehensive and Extensible Mask Library Automated patching for Oracle products and the operating system Sophisticated Masking Techniques

Answer: C Section: (none) Explanation/Reference:

QUESTION 129 You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task? A. B. C. D. Audit Vault Database Vault Advanced Security Enterprise Manager Data Masking Pack

Answer: B Section: (none) Explanation/Reference:

QUESTION 130 Which of the following is NOT a feature of the Data Masking Pack? A. B. C. D. Automated patching for Oracle products and the operating system Sophisticated Masking Techniques Secure High Performance Mask Execution Comprehensive and Extensible Mask Library

Answer: A Section: (none) Explanation/Reference:

QUESTION 131 Which of the following security options provides easy compliance by automating access control? A. B. C. D. Oracle Audit Vault Oracle Database Vault Oracle Data masking Pack Oracle Advanced Security

Answer: A Section: (none) Explanation/Reference:

QUESTION 132 Which of the following Enterprise Manager Packs supports masking and script generation? A. B. C. D. Oracle Tuning Oracle Change Management Oracle Configuration Management Oracle Data Masking

Answer: D Section: (none) Explanation/Reference:

QUESTION 133 Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task? A. Enterprise Data Masking Pack B. Audit Vault C. Database Vault

D. Advanced Security Option Answer: B Section: (none) Explanation/Reference:

QUESTION 134 Which of the following security features are of Oracle Advanced Security that are used to solve the security challenges enhanced by Security in Enterprise Grid Computing Environments, Security in an Intranet or Internet Environment, and Common Security Threats? Each correct answer represents a complete solution. Choose two. A. B. C. D. Protecting Audit data from tampering Separation of Duty Strong Authentication Data Encryption

Answer: CD Section: (none) Explanation/Reference:

QUESTION 135 Which of the following security options provides easy compliance by automating access control? A. B. C. D. Oracle Database Vault Oracle Data masking Pack Oracle Advanced Security Oracle Audit Vault

Answer: D Section: (none) Explanation/Reference:

You might also like