1.
Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server and deals with the development of various database applications. During such developments, production
data is copied into other non-production environments. This leads to several confidential risks. Andrew has been assigned the task to minimize the risk of handling such sensitive information. Which pack of Enterprise Manager should he adopt to accomplish the task?
2.
David works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. David wants to adapt such a security option that will provide no application changes to the database,
built-in key management, and high performance to the database. Which security option should he adopt to accomplish the task?
3.
You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task?
4.
You work as a Security Administrator for uCertify Inc. The company uses Oracle 11g as the database server. You have been asked to use an application that creates public and private key pairs and can be also used for
storage and management of certificate authority certificates. Which of the following applications will you use to accomplish this task?
5.
Which of the following security options provides easy compliance by automating access control?
6.
Which of the following is NOT a feature of the Data Masking Pack?
7.
David works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. David wants to adopt security options so as to protect the database of the company. Which of the following security options should he adopt to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
8.
Which method should be adopted to retrieve all those rows whose sensitive columns have a null value and which are restricted by Virtual Private Database security?
9.
Streams engine decrypt the encrypted data to allow data transformation (character sets, database versions, platforms, etc.) and it is not encrypted at the time it is made transmitted to the other databases. Which of the following types of encryption is needed to resolve this issue?
10.
Andrew works as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as its database. Andrew applied the Oracle Audit Vault security to the database so that alteration or modification of the data is not allowed. Which of the following features are supported by this security option?