Q1. Which statement is true about Network ACLs?
A.They ate used to control access by users to external network services and resources from the database through PL/SQL.
B. They are used to provide access to database packages.
C. They are used to control the usage of UTL_TCP, ITL_HTTP, and UTL_INADDR.
D. They are used to configure proxy for PL/SQL network utility packages.
Correct Answer: D
Q2. You must restrict execution of the alter system checkpoint command to certain conditions, specified in a rule set used by a command rule. Which two parameters must be specified In the dbms_macadm.create_command_rule procedure to do this?
A.PARAMETER_NAM=>'CHECKPOINT'
B. OBJECT_OWNER=>'SYS
C. CLAUSE_NAME=>'CHECKPOINT'
D. CLAUSE_NAME=>'SYSTEM'
E. COMMANI>=>' ALTER SYSTEM'
F. OBJECT_NAME=>'CHECKPOINT'
G. COMMAND=>'ALTER'
Correct Answer: C, D
Q3. Examine this parameter In sqinet.ora: SQLNET.ADTHENTICATION_SEBVICES=(NONE) For which two cases do you need a password file?
A.to authenticate externally Identified users locally
B. to authenticate nonprivllegcd database users locally
C. to authenticate administrative privileged users remotely
D. to authenticate externally Identified users remotely
E. to authenticate nonprivileged database users remotely
F. to authenticate administrative privileged users locally
Correct Answer: C, E
Q4. Which four products, features, or methods can help facilitate compliance with various privacy-related regulatory requirements such as PCI-DSS and the EU GDPR?
A.Data Redaction
B. Data Guard
C. Real Application Clusters
D. Transparent Data Encryption
E. Data Masking & Subsetting
F. Table Partitioning
G. Database Vault
H. Real Application Testing
A, B, E, I
$ 39
Reviews
There are no reviews yet.