Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which two statements are true about the Secure External Password Store (SEPS)?

A.

Password credentials are stored on the database server.

B.

Bypassing database authentication adds significant performance benefits to middle-tier applications.

C.

The database does not need to authenticate the connection because the password credentials are stored in a wallet.

D.

Wallet usage secures deployments that rely on password credentials for connecting to databases Instances.

E.

Password rotation policies can be enforced without changing application code.

Full Access
Question # 5

Examine these steps:

1. Run the DBSAT Collector

2. Run the DBSAT Discoverer

3. Run the DBSAT Reporter

Identify the minimum required steps for producing a report of schemas with sensitive data.

A.

1,2

B.

2

C.

1,2,3

D.

2,3

Full Access
Question # 6

Examine this query:

Why is this account in this status?

A.

The account uses a global authentication.

B.

The user exceeded the value of FAILED_LOGIN _ATTEMPTS and its password has not been reset yet.

C.

The account has the SYSDBA privilege granted.

D.

The user exceeded the value of PASSWORD_LIFE_TIME and Its password has not been reset yet

E.

The ACCOUNTS_ STATUS column is not updated until the user attempts to log in.

Full Access
Question # 7

A database link must be created to connect a source Autonomous Database to target on premises database.

Examine this command:

Which two options are true?

A.

The target database wallet can be uploaded to the data_pctmp_dtr directory.

B.

The db_link_cred parameter stores the password in a wallet.

C.

The db__link__cred references the credential for the username and password for the target database.

D.

The credential_namĀ£ parameter automatically creates the credential object store.

E.

The database link port Is not correct because It must be restricted to 1521.

F.

Only data_pump_dir directory can be used to store credential wallets.

Full Access
Question # 8

What is true about the client identifier?

A.

The client Identifier is automatically included In the audit trail.

B.

The client Identifier is automatically set by the SQL-Net layer.

C.

A session can have multiple client Identifier values set simultaneously.

D.

The client Identifier cannot be changed during the session.

Full Access
Question # 9

The sqinet.oia file on the client contains this parameter setting:

SQLNET.ENCRYPTION_CLIEKT = REQUESTED

What value for the parameter sQLNET.ENCRYPTION _server In the sqlnet.ora file on the server will disable Encryption and Data Negotiation?

A.

REQUESTED

B.

ACCEPTED

C.

REQUIRED

D.

REJECTED

Full Access
Question # 10

Examine the statement:

CREATE BOLE hr_admin IDENTIFIED USING pac_mgr.hr_admin_rola_ch9ck;

Which three are true about the sec_mgr. hr_admin_role_check procedure?

A.

It must use only one security check to validate the user.

B.

It must use the invokcr's rights to enable the role,

C.

It must use the deflner's rights to enable the role.

D.

It can Include one or more security checks to validate the user.

E.

It must contain a SET ROLE statement or a DBMS_SESSION.SET_ROLE call.

F.

It can use only the DBMS_SESSION. SET_ROLE procedure.

G.

Its owner SEC_MGR must be granted the execute any procedure role.

Full Access
Question # 11

Which three are true concerning command rules?

A.

System privileges override command rules.

B.

If a command rule's associated rule set evaluation results In an error, the command is not allowed to execute.

C.

A command can have only one command rule that applies to it.

D.

For DML statement command rules, you can specify a wildcard for the object owner.

E.

If a command rule's associated rule set Is disabled, then the rule set evaluates to true.

F.

For DML statement command rules, you can specify a wildcard for the object name.

G.

Object privileges override command rules.

Full Access
Question # 12

The listener configuration contains these lines related to Valid Node Checking for Registration (VNCR);

Which two statements are true?

A.

Both parameters cannot be set at the same time so will be Ignored.

B.

Listener listener will allow instance registration from IP address 192.168.20.2.

C.

Listener listener will allow Instance registration from

REGISTRATION_INVITED_NODES_LISTENEP.

D.

Listener listener will only deny instance registration from

REGISTRATION EXCLUDED NODES LISTENER.

E.

Listener listener will deny instance registration from IP address 192.168.20.2.

Full Access
Question # 13

Oracle Database Vault is enabled In the database. You have these requirements:

1. Database administrator dbai must export and import data from and to a non-protected schema.

2. Database administrator dba2 must export and Import data from and to a protected schema.

Which three options together satisfy these requirements?

A.

Grant become user to dbai.

B.

Grant sysoper to both users.

C.

Run d3ms_macadm.authorize_datapump_user procedure granting dbai privileges to impdp and expdp utilities.

D.

Grant imp_full_database and exp_full_database to dbai and dba2.

E.

Run dbms_macadm.authobize_datapump_useb procedure granting dba2 privileges to impdp and expdp utilities.

F.

Grant become user to dba2.

G.

Grant sysdba to both users.

Full Access