[Free] 2018(Jan) EnsurePass Testinsides Oracle 1z0-528 Dumps with VCE and PDF Download 41-50

Ensurepass.com : Ensure you pass the IT Exams 2018 Jan Oracle Official New Released 1z0-528
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/1z0-528.html

Oracle Database 11g Security Essentials

Question No: 41

Comparing Transparent Data Encryption (TDE) column-based encryption and Transparent Data Encryption (TDE) tablespace-based encryption, which of the following statements is true?

  1. With Transparent Data Encryption (TDE) column-based encryption, you cannot change the masterencryption key with an ALTER SYSTEM command.

  2. With TDE column-based encryption, you cannot prevent encrypted data from having the same distribution ofcharacters that it has unencrypted.

  3. With Transparent Data Encryption (TDE) tablespace-based encryption, performance is generally worse thancolumn-based encryption, because encryption is done at the I/O level.

  4. With TDE tablespace-based encryption, data in the UNDO tablespace is encrypted.

  5. With TDE tablespace-based encryption, data blocks that come from an encrypted tablespace are storedunencrypted in temporary tables.

Answer: C Explanation:

TDE column encryption affects performance only when data is retrieved from or inserted into an encryptedcolumn.

The total performance overhead depends on the number of encrypted columns andtheir frequency of access. The columns most appropriate for encryption are thosecontaining the most sensitive data.

Enabling encryption on an existing table results in a full table update like any otherALTER TABLE operation that modifies table characteristics. Administrators shouldkeep in mind the

potential performance and redo log impact on the database serverbefore enabling encryption on a large existing table.

A table can temporarily become inaccessible for write operations while encryption isbeing enabled, table keys are being rekeyed, or the encryption algorithm is beingchanged.

Question No: 42

Your customer wants to be alerted whenever an unauthorized user tries to access sensitive data in their database. Which of the following is the easiest way to implement this capability with Oracle Audit Vault?

  1. You cannot do this with Oracle Audit Vault because you can use only predefined alerts.

  2. Create a custom Oracle Audit Vault alert to report a failed login attempt.

  3. Create a custom Oracle Audit Vault alert to report an attempt to view sensitive data.

  4. Run frequent reports on the Oracle Audit Vault repository to determine if any attempts had been made toview sensitive data.

Answer: C

Question No: 43

To which two levels of data organization can a Oracle Database Vault realm prevent access?

  1. Table

  2. Column

  3. Rows in a table

  4. Schema

  5. Database

Answer: A,D Explanation:

Guidelines for Designing Realms

Create realms based on the schemas and roles that form a database application

There are situations in which you may want to protect an object by a realm, but still enable access to objectsthat are part of this realm-protected object. For example, suppose you

create a realm around a specific table.

However, you want users to be able to create an index on this

Question No: 44

Which three processes are included in the pre-masking validation?

  1. Check space availability

  2. Check presence of default partitions

  3. Ensure formats don#39;t match column data types

  4. Warn about check constraints

  5. Ensure there are no uniqueness constraints

Answer: A,B,C Explanation:

Prior to mask execution, Oracle Data Masking Pack performs several pre-mask validation checks, suchas validating that the mask formats matches the table data types, checking for space, to ensure that themasking process is error-free.

Pre-Masking Validation Ensure uniqueness can be maintained Ensure formats matchcolumn data types Check Space availability Warn about Check Constraints Check presenceof default Partitions

Question No: 45

Your customer has been told by their auditors that they must implement the principle of least privilege across all their sensitive data, but they are not sure what this means. What explanation will best explain this principle?

  1. You should grant system privileges to the smallest number of administrators who really need it.

  2. All users will have the least amount of privilege that will allow them to do their jobs.

  3. Access control will be implemented by the least number of administrators.

  4. They should implement a separate set of security procedures to deny access to sensitive data, and allowthe least number of privileged users to avoid these procedures.

Answer: D

Question No: 46

What database security feature or option is used to enforce strong authentication?

  1. Advanced Security

  2. Oracle Database Vault

  3. Oracle Audit Vault

  4. Oracle LabelSecurity

  5. Oracle Data Masking Pack

  6. Virtual Private Database

Answer: A Explanation:

Oracle also recommends, if possible, using Oracle Advanced Security (an option to Oracle DatabaseEnterprise Edition) with network authentication services (such as Kerberos), token cards, smart cards, or X.509certificates. These services provide strong authentication of users, and provide better protection againstunauthorized access to Oracle Database.

Question No: 47

Prior to Oracle Audit Vault 10.2.3.2, what was the purpose of the REFRESH_WAREHOUSE_DATA Audit Vault job?

  1. To collect audit trail information from agents

  2. To load collected Oracle Audit Vault rows into the repository

  3. To refresh audit statistics in the target databases

  4. To reset totals in the Oracle Audit Vault repository

Answer: B Explanation:

Refreshes the data warehouse with the data in the raw audit data store since the last refreshoperation.

Starting with this release, the Oracle Audit Vault data warehouse is automatically refreshed

with incoming auditdata as it collects audit data. Because the warehouse isrefreshed in real-time, auditors can generate more accurate reports on audited activities.

Question No: 48

Which three of the following are requirements that can lead to greater security requirements?

  1. PCI

  2. SOX

  3. HIPPA

  4. WWF

  5. ISO-9000

Answer: A,B,C Explanation:

By restricting administrator access to your Oracle databases, Oracle Database Vault helps you to followcommon regulatory compliance requirements, such as the Payment Card Industry (PCI) Data SecurityStandard (DSS) requirements, Sarbanes-Oxley (SOX) Act, European Union (EU) Privacy Directive, andHealthcare Insurance Portability and Accountability (HIPAA) Act.

Question No: 49

Which of the following collectors can access audit records from more than one audit source?

  1. DB2

  2. SQL Server

  3. Sybase

  4. Informix

Answer: B Explanation:

A database instance that has been configured to send audit data to Oracle Audit Vault. The audit data source consists of databases, applications, or systems that generateaudit data. For the current release of Oracle Audit Vault, the following databaseproducts are audit data sources:

Oracle Database Microsoft SQL Server Sybase ASE

IBM DB2

Question No: 50

Which of the following is NOT an AVORCLDB command?

  1. setup

  2. start_agent

  3. add_source

  4. add_collector

Answer: B Explanation:

Audit Vault Oracle Database (AVORCLDB) Utility Commands avorcldb

add_collector add_source alter_collector alter_source drop_collector drop_source

-help setup verify

100% Ensurepass Free Download!
Download Free Demo:1z0-528 Demo PDF
100% Ensurepass Free Guaranteed!
1z0-528 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Add a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.