1.
Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server. Andrew has been assigned the task to apply a security feature to the database of the organization to
protect the database from insiders. This security feature should also mitigate several security risks. Which of the following security features should he adopt to accomplish the task?
2.
Which of the following is NOT a feature of the Data Masking Pack?
3.
You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in the company. You want to protect data from privileged users through some preventive controls and also secure the database transparently. Which of the following security options will you adopt to accomplish the task?
4.
You have a system installed with Oracle 11g. You are concerned about the security of the database instances in your system. You plan to use Oracle Database Vault to create several components to manage the security of the database instances. Which of the following components can be created using Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply.
5.
Sam works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as the database server. Sam wants to adopt a security feature on the database that enforces the security rules, regardless of the way the data is accessed. Which of the following security features should he adopt to accomplish the task?
6.
Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the database server and deals with the development of various database applications. During such developments, production
data is copied into other non-production environments. This leads to several confidential risks. Andrew has been assigned the task to minimize the risk of handling such sensitive information. Which pack of Enterprise Manager should he adopt to accomplish the task?

 
7.
Which of the following components of Oracle Database Vault is a Java application that is built on top of the
Oracle Database Vault PL/SQL application programming interfaces (API)?
8.
Which of the following are the advantages of Oracle Database Vault? Each correct answer represents a complete solution. Choose all that apply.
9.
Which method should be adopted to retrieve all those rows whose sensitive columns have a null value and which are restricted by Virtual Private Database security?
10.
David works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as the database server. David wants to adapt such a security option that will provide no application changes to the database, built-in key management, and high performance to the database. Which security option should he adopt to accomplish the task?