1.
Which of the following encryption algorithms is used by transparent data encryption by default?
2.
Which of the following is the container in which transparent data encryption stores the master key?
3.
Which of the following commands is used to load the master encryption key after the database is restarted?
4.
Which of the following features differentiates tablespace encryption from column encryption?
5.
Which of the following roles or privileges is created during installation and used for creating new database accounts?
6.
Which of the following is a functional grouping of database schemas and roles that must be secured for a given application?
7.
Which of the following components involves command rule granularity?
8.
Which of the following tasks is assigned to the database administrator while using database vault?
9.
Which of the following regulations addresses unauthorized access to data?
10.
Which of the following Enterprise Manager Packs supports masking and script generation?