This page was exported from Free Exam Dumps Collection [ http://free.examcollectionpass.com ] Export date:Thu Nov 28 0:46:34 2024 / +0000 GMT ___________________________________________________ Title: [Q32-Q55] View 1z1-116 Exam Question Dumps With Latest Demo [Aug 15, 2022] --------------------------------------------------- View 1z1-116 Exam Question Dumps With Latest Demo [Aug 15, 2022] Free 1z1-116 Test Questions Real Practice Test Questions NO.32 You are connected to an Oracle database Instance as a user with privileges to query the hr.employees table.You are not exempt from any reduction policies.Examine this query and result:You implement this Data Redaction policy:You re-execute the select statement.What is the result?A)B)C)D)E)  Option A  Option B  Option C  Option D  Option E NO.33 Database Vault realm r protects all tables In the fin schema from DBA access User fin is configured as the owner in realm R.You must also prevent access to realm r protected tables by user FIN. Which achieves this?  Revoke the select any table privilege from user FIN.  Make realm R a mandatory realm.  Remove the owner authorization of user fin in realm R.  Make user FIN participant In realm r. Instead of owner. NO.34 A DBA user created and configured this secure application role:Why does the error occur?  User psmith Is connecting outside of the SYSDATE specified.  The set hole hr_admin stuternent must be executed with the dbms. session. set_role procedure.  user psmith is connecting remotely.  The HR_ADMIN role must be granted to user PSMITH.  The HR.ROLE_CHECK procedure must be created with the AUTHID CURRENT_USERR clause.  The HR.ROLE_CHECK procedure must be created without the AUTHID clause. NO.35 The utl_http package is used to invoke REST API’s to manage Oracle GoldenGate Microservlces Architecture components on host1.You must use dbms__network_acl_admin to specify a range of ports to be used when connecting to host01.What three requirements must you consider?  The lower_port may be null but the upper_port must specify a value.  The port range must not overlap with any other port ranges for host01.  upper_port must be greater than or equal to lower_port.  The port range may not include values larger than or equal to 1024.  Both lower_port and upper_port must not be NULL  The upper_port may be null but the lower_port must specify a value. NO.36 What does the Application Data Modeling module of the Oracle Data Masking and Subsetting Pack search for?  data redaction policies  data masking transformations  parent/child relationships between the columns holding sensitive information  encrypted columns Create an Application Data Model – To begin using Oracle Data Masking and Subsetting, you must create an Application Data Model (ADM). ADMs capture application metadata, referential relationships, and discover sensitive data from the source database.https://docs.oracle.com/database/121/DMKSB/intro.htm#:~:text=Create%20an%20Application%20Data%20Model,data%20from%20the%20source%20database.NO.37 Using Unified Audit, you must determine who performed an pkan backup ot recovery operations on a database.You are connected as sysdba.Which statement(s) achieve this?A)B)C)D)E)  Option A  Option B  Option C  Option D  Option E NO.38 User jane must report on who has done RMAN backups on a database that has Unified Auditing enabled.What is the minimum that must be done to allow JANE to generate these reports?  Use create audit policy.  Use grant audit_admin to Jane;  Use grant audit_viewer to Jane;  Use alter system set AUDIT_SYS_OPERATION= TRUE; NO.39 Examine these commands and the output used to configure Real Application Security:What does this output mean?  You treated an access control list that references a non-existent policy.  You created an access control list that references a non-existent realm.  You created a policy that references a non-existent access control list.  You created a realm and an access control list that reference a non-existent policy.  You created a policy that references a non-existent realm.  You created a realm that references a non-existent policy. NO.40 Which type of attack attempts to find data by repeatedly trying similar SQL with a modified predicate?  timing attack  Inference attack  data remanence attack  cache attack  side-channel attack  known-plaintext attack NO.41 Which type of masking directly masks and subsets data In a nonproduction database with minimal or no Impact on production environments?  conditional format  heterogeneous  in-database  deterministic  In-export In-DatabaseIn-Database mode directly masks and subsets the data within a non-production database with minimal or no impact on production environments. Since the In-Database masking and subsetting mode permanently changes the data in a database, it is strongly recommended to use this mode for non-production environments such as staging, test, and development databases rather than using it on production databases.https://docs.oracle.com/database/121/DMKSB/intro.htm#DMKSB-GUID-F949A83E-3C01-45B5-9BAF-9940BB140AA0NO.42 Which two does the master key encrypt with Transparent Data Encryption?  encrypted columns  encryption wallet  temporary segments  encrypted tablespace keys  encrypted tablespaces  encrypted column keys NO.43 Which two privileges can be restricted at the column level?  SELECT  INSERT  REVOKE  UPDATE  GRANT  DELETE NO.44 Which two represent the set of users that are never affected by connect command rules?  SYS  users with the DV_ACCTMGR role  users with the DV_OWNER role  users with the DV_ADMIN role  SYSTEM NO.45 Examine these commands and responses:User Karen is an enterprise user.Which two commands are used to allow this login?  GRANT CREATE SESSION TO karan;  CREATE USER guest IDENTIFIED BY karen;  CREATE USER karen IDENTIFIED BY guest;  CREATE USER guest IDENTIFIED GLOBALLY as ”;  GRANT CREATE SESSION TO guest; NO.46 A policy predicate function Is associated with an enabled Virtual Private Database (VPD) policy for a table.Which two arguments are passed to the function?  the table name  the schema owning the table  the policy type  the policy name  the policy group to which the policy belongs NO.47 You develop an HR application that must allow multiple sessions to share application attributes. Which statement is executed while implementing the requirement?  CREATE CONTEXT global_hr USING hr_pkg;  CREATE CONTEXT global_hr USING hr_pkg ACCESSED GLOBALLY;  CREATE CONTEXT global_hr USING hr_pkg INITIALIZED GLOBALLY;  CREATE CONTEXT global_hr USING hr_pkg INITIALIZED EXTERNALLY; NO.48 Examine this sqlnet.ora file used by a client application:Which three are found in the wallet specified by the directory parameter?  the private key of the database service  the trusted certificates of the database service  the user certificate used to uniquely Identify the database service  the private key of the client application  the username, password, and service name required to connect to the database  the user certificate used to uniquely Identify the client application  the trusted certificates of the Certification Authority NO.49 You must restrict execution of the alter system checkpoint command to certain conditions, specified in a rule set used by a command rule.Which two parameters must be specified In the dbms_macadm.create_command_rule procedure to do this?  PARAMETER_NAMĀ£=>’CHECKPOINT’  OBJECT_OWNER=>’SYS  CLAUSE_NAME=>’CHECKPOINT’  CLAUSE_NAME=>’SYSTEM’  COMMANI>=>’ ALTER SYSTEM’  OBJECT_NAME=>’CHECKPOINT’  COMMAND=>’ALTER’ NO.50 As the SYSKM user you must create the password-based keystore, which will be used for TDE. Examine this list:Identify the sequence that Oracle uses to search for the keystore and its location.  3,5,2,4,1  1,4,5,2  1,2,5,4  1,2,3,5 NO.51 Examine this configuration and requirement:1. The hr user created a private database link in the pdb2 pluggable database linking to the hr schema In the PDBl pluggable database.2. Other users in pdb2 must query the remote HR.EMPLOYEES table In PDBI using this database link.Which two operations together ensure that the database link provides access only to the HR.EMPLOYEES table in the PDBI pluggable database?  Only grant other users access to the HR.EMPLOYEES table In the pdb2 pluggable database.  Grant other users access to the database link in the PDBI pluggable database.  Grant access to the view of the remote HR.EMPLOYEES table In the PDB2 pluggable database.  Grant other users access to the database link In the PDB2 pluggable database.  Create a view In the HR schema for the remote hr. employees table of the pdb2 pluggable database . NO.52 You are the Service Consumer In the Cloud Shared Responsibility Model.Which three are your responsibility when using the Infrastructure as a Service (IaaS)?  application  host Infrastructure  network  data  physical  guest OS  virtualization  database NO.53 Examine these commands that execute successfully:What must be done to allow the index to be used?  Use tublespace encryption instead of column encryption.  Add the first_name column to the ix_employee Index to Improve its selectivity.  Create a SQL baseline to preserve the execution plan from before the encryption.  Enable encryption hardware acceleration on the CPUs of the machine. NO.54 Which three are part of an access control list (ACL) when using Real Application Security?  privileges  schemas  data realms  column constraints  policies  data realm constraints  roles NO.55 Which two statements are true about column-level transparent data encryption?  It can bo used for tables in encrypted tablcspaces.  encrypted columns cannot have an Index.  All encrypted columns of a table use the same encryption key.  Column level encrypted data remains encrypted in the buffer cache.  Column-level encryption keys are not encrypted by the master key.  Loading … View All 1z1-116 Actual Free Exam Questions Updated: https://www.examcollectionpass.com/Oracle/1z1-116-practice-exam-dumps.html --------------------------------------------------- Images: https://free.examcollectionpass.com/wp-content/plugins/watu/loading.gif https://free.examcollectionpass.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-08-15 16:56:49 Post date GMT: 2022-08-15 16:56:49 Post modified date: 2022-08-15 16:56:49 Post modified date GMT: 2022-08-15 16:56:49