Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

41
Oracle_RealExamQuestions.Com_1Z0-528_v2011-11-09_135q_By-Charlie Number : 1Z0-528 Passing Score : 660 Time Limit : 120 min File Version : 2011-11-09 Exam : Oracle_RealExamQuestions.Com_1Z0-528 Ver :2011-11-09 Question : 135 Old questions are modified and new question-answers are also uploaded for the exam preperation with more understandable examples. good luck By-Charlie

Transcript of Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

Page 1: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

Oracle_RealExamQuestions.Com_1Z0-528_v2011-11-09_135q_By-Charlie

Number: 1Z0-528Passing Score: 660Time Limit : 120 minFile Version: 2011-11-09

Exam : Oracle_RealExamQuestions.Com_1Z0-528

Ver :2011-11-09

Question : 135

Old questions are modified and new question-answers are also uploaded for the exam preperation withmore understandable examples.

good luck

By-Charlie

Page 2: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

Exam A

QUESTION 1Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as thedatabase server. Andrew has been assigned the task to apply a security feature to the database of theorganization to protect the database from insiders. This security feature should also mitigate severalsecurity risks. Which of the following security features should he adopt to accomplish the task?

A. Database Vault

B. Advanced Security Option

C. Enterprise Data Masking Pack

D. Audit Vault

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 2Which of the following is NOT a feature of the Data Masking Pack?

A. Secure High Performance Mask Execution

B. Comprehensive and Extensible Mask Library

C. Automated patching for Oracle products and the operating system

D. Sophisticated Masking Techniques

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 3You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in thecompany. You want to protect data from privileged users through some preventive controls and alsosecure the database transparently. Which of the following security options will you adopt to accomplish thetask?

A. Audit Vault

B. Database Vault

C. Advanced Security

D. Enterprise Manager Data Masking Pack

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 4You have a system installed with Oracle 11g. You are concerned about the security of the databaseinstances in your system. You plan to use Oracle Database Vault to create several components to managethe security of the database instances. Which of the following components can be created using OracleDatabase Vault? Each correct answer represents a complete solution. Choose all that apply.

Page 3: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

A. Factors

B. Command rules

C. Realms

D. RMAN

Answer: ABC

Section: (none)

Explanation/Reference:

QUESTION 5Sam works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as thedatabase server. Sam wants to adopt a security feature on the database that enforces the security rules,regardless of the way the data is accessed. Which of the following security features should he adopt toaccomplish the task?

A. Real Application Cluster (RAC)

B. Label Security

C. Enhanced security features with execution context

D. Virtual Private Database (VPD)

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 6Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as thedatabase server and deals with the development of various database applications. During suchdevelopments, production data is copied into other non-production environments. This leads to severalconfidential risks. Andrew has been assigned the task to minimize the risk of handling such sensitiveinformation. Which pack of Enterprise Manager should he adopt to accomplish the task?

A. Oracle Diagnostic Pack

B. Oracle Data Masking Pack

C. Oracle Change Management Pack

D. Oracle Configuration Management Pack

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 7Which of the following components of Oracle Database Vault is a Java application that is built on top ofthe Oracle Database Vault PL/SQL application programming interfaces (API)?

A. Oracle Database Vault Reporting and Monitoring Tools

B. Oracle Database Vault Administrator (DVA)

C. Oracle Database Vault DVSYS and DVF Schemas

Page 4: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

D. Oracle Database Vault Access Control Components

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 8Which of the following are the advantages of Oracle Database Vault? Each correct answer represents acomplete solution. Choose all that apply.

A. It disables the separation of duty.

B. It controls access to database and application data by highly privileged users.

C. It imposes multi-factor authorization by the use of flexible business rules.

D. It enables the separation of duty.

Answer: BCD

Section: (none)

Explanation/Reference:

QUESTION 9Which method should be adopted to retrieve all those rows whose sensitive columns have a null valueand which are restricted by Virtual Private Database security?

A. Column masking

B. Access Control List

C. Transparent Tablespace Encryption

D. Transparent Data Encryption

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 10David works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as thedatabase server. David wants to adapt such a security option that will provide no application changes tothe database, built-in key management, and high performance to the database. Which security optionshould he adopt to accomplish the task?

A. Database Vault

B. Label Security

C. Audit Vault

D. Advanced Security Option

Answer: D

Section: (none)

Explanation/Reference:

Page 5: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

QUESTION 11Which of the following options employs labeling concepts used by government and defense organizationsto protect sensitive information and to provide data separation?

A. Oracle Database Vault Security

B. Oracle Advanced Security

C. Oracle Audit Vault Security

D. Oracle Label Security

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 12Sam works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as thedatabase server. Sam wants to protect the company's data by encrypting the physical data files created onthe operating system. Which of the following types of encryption should he use to accomplish the task?

A. Transparent Data Encryption (TDE) for securefiles

B. Transparent Data Encryption (TDE) for column

C. Transparent Data Encryption (TDE) for tablespace

D. Network encryption

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 13You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its databaseserver. The server contains a database named "Company_Project_Details". The database is sharedamong multiple departments of the company for regular updation. Looking at the security issues of thedatabase, you have been assigned the task to apply some security solution to the database.To accomplish the task, you plan to apply Database Label Security on this database. Which of thefollowing components of the Database Label Security should you apply in order to secure this database?Each correct answer represents a complete solution. Choose all that apply.

A. Levels

B. Source database

C. Compartments

D. Groups

Answer: ACD

Section: (none)

Explanation/Reference:

QUESTION 14David works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as thedatabase server. David wants to adopt security options so as to protect the database of the company.

Page 6: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

Which of the following security options should he adopt to accomplish the task? Each correct answerrepresents a complete solution. Choose all that apply.

A. Database Vault

B. Chain of trust

C. Audit Vault

D. Advanced Security Option

Answer: ACD

Section: (none)

Explanation/Reference:

QUESTION 15You have a system installed with Oracle 11g. You are concerned about the security of the databaseinstances in your system. You plan to use Oracle Database Vault to create several components to managethe security of the database instances. Which of the following components can be created using OracleDatabase Vault? Each correct answer represents a complete solution. Choose all that apply.

A. RMAN

B. Realms

C. Factors

D. Command rules

Answer: BCD

Section: (none)

Explanation/Reference:

QUESTION 16Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as thedatabase server and deals with the development of various database applications. During suchdevelopments, production data is copied into other non-production environments. This leads to severalconfidential risks. Andrew has been assigned the task to minimize the risk of handling such sensitiveinformation. Which pack of Enterprise Manager should he adopt to accomplish the task?

A. Oracle Diagnostic Pack

B. Oracle Configuration Management Pack

C. Oracle Data Masking Pack

D. Oracle Change Management Pack

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 17David works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as thedatabase server. David wants to adapt such a security option that will provide no application changes tothe database, built-in key management, and high performance to the database. Which security optionshould he adopt to accomplish the task?

Page 7: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

A. Database Vault

B. Label Security

C. Audit Vault

D. Advanced Security Option

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 18You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in thecompany. You want to protect data from privileged users through some preventive controls and alsosecure the database transparently. Which of the following security options will you adopt to accomplish thetask?

A. Database Vault

B. Audit Vault

C. Advanced Security

D. Enterprise Manager Data Masking Pack

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 19You work as a Security Administrator for uCertify Inc. The company uses Oracle 11g as the databaseserver. You have been asked to use an application that creates public and private key pairs and can bealso used for storage and management of certificate authority certificates. Which of the followingapplications will you use to accomplish this task?

A. Oracle Wallet Manager

B. Oracle Connection Manager

C. Oracle Enterprise Manager

D. Oracle Net Manager

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 20Which of the following security options provides easy compliance by automating access control?

A. Oracle Database Vault

B. Oracle Data masking Pack

C. Oracle Advanced Security

D. Oracle Audit Vault

Answer: D

Page 8: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

Section: (none)

Explanation/Reference:

QUESTION 21Which of the following is NOT a feature of the Data Masking Pack?

A. Comprehensive and Extensible Mask Library

B. Secure High Performance Mask Execution

C. Automated patching for Oracle products and the operating system

D. Sophisticated Masking Techniques

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 22David works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as thedatabase server. David wants to adopt security options so as to protect the database of the company.Which of the following security options should he adopt to accomplish the task? Each correct answerrepresents a complete solution. Choose all that apply.

A. Database Vault

B. Advanced Security Option

C. Audit Vault

D. Chain of trust

Answer: ABC

Section: (none)

Explanation/Reference:

QUESTION 23Which method should be adopted to retrieve all those rows whose sensitive columns have a null valueand which are restricted by Virtual Private Database security?

A. Access Control List

B. Transparent Data Encryption

C. Column masking

D. Transparent Tablespace Encryption

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 24Streams engine decrypt the encrypted data to allow data transformation (character sets, databaseversions, platforms, etc.) and it is not encrypted at the time it is made transmitted to the other databases.

Page 9: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

Which of the following types of encryption is needed to resolve this issue?

A. Network Encryption

B. Transparent Data Encryption

C. TDE Tablespace Encryption

D. TDE Column Encryption

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 25Andrew works as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as itsdatabase. Andrew applied the Oracle Audit Vault security to the database so that alteration or modificationof the data is not allowed. Which of the following features are supported by this security option?

A. It simplifies compliance reporting.

B. It provides encryption technique.

C. It helps in early detection of threats.

D. It couples fine-grained access control.

Answer: AC

Section: (none)

Explanation/Reference:

QUESTION 26Which of the following are the guidelines of Password Management Policy that enhances the walletpassword management module?Each correct answer represents a complete solution. Choose all that apply.

A. The minimum password length required is of 8 characters.

B. The alphanumeric character mix is required.

C. The minimum password length required is of 6 characters.

D. The maximum password length is unlimited.

Answer: ABD

Section: (none)

Explanation/Reference:

QUESTION 27Andrew works as a Database Administrator in Infotech Inc. The company uses Oracle 11g as its database.Andrew applied the Oracle Advanced Security for the protection of the database. Its also required to applyauthentication methods to authenticate users for the database protection. Which of the followingauthentication methods should he adopt to accomplish the following task?Each correct answer represents a complete solution. Choose all that apply.

A. Kerberos

B. RADIUS

Page 10: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

C. Pre-shared key

D. Secure Sockets Layer

Answer: ABD

Section: (none)

Explanation/Reference:

QUESTION 28Which of the following authentication methods supported by Oracle Advanced Security provides thebenefit of single sign-on (SSO) capability, to enable users to access multiple accounts and applicationswith a single password? Each correct answer represents a complete solution. Choose all that apply.

A. Kerberos

B. Secure Sockets Layer

C. Remote Authentication Dial-In User Service

D. Entrust/PKI

Answer: AD

Section: (none)

Explanation/Reference:

QUESTION 29You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its databaseserver. The server contains a database named "Company_Project_Details". The database is sharedamong multiple departments of the company for regular updation. Looking at the security issues of thedatabase, you have been assigned the task to apply some security solution to the database.To accomplish the task, you plan to apply Database Label Security on this database. Which of thefollowing components of the Database Label Security should you apply in order to secure this database?Each correct answer represents a complete solution. Choose all that apply.

A. Levels

B. Source database

C. Groups

D. Compartments

Answer: ACD

Section: (none)

Explanation/Reference:

QUESTION 30Sam works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as thedatabase server. Sam wants to adopt a security feature on the database that enforces the security rules,regardless of the way the data is accessed. Which of the following security features should he adopt toaccomplish the task?

A. Enhanced security features with execution context

B. Virtual Private Database (VPD)

C. Label Security

D. Real Application Cluster (RAC)

Page 11: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 31Which of the following tasks is performed by using ALTER SYSTEM SET ENCRYPTION KEYcertificate_ID IDENTIFIED BY password; SQL command?

A. Create table and encrypt column.

B. Set or Reset master encryption key

C. Set or Reset master encryption key to use PKI certificate

D. Encrypts unencrypted existing column

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 32Sam works as a Database Administrator for Tech-Mart Inc. The company uses an Oracle 11g databaseserver. Andrew wants to secure the data on the network from unauthorized users by encrypting it. Whichof the following security option should he use to accomplish the following task?

A. Oracle Database Vault

B. Oracle Data Masking Pack

C. Oracle Advanced Security

D. Oracle Audit Vault

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 33Which of the following features are required to mask data by making use of Oracle Data Masking Pack ?

A. Masking definitions

B. Masking subnet

C. Masking backward

D. Masking format libraries

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 34You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its database

Page 12: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

server. During the management of company's database its required to add encrypted column to existingtable for the protection of database files. Which of the following SQL commands will you use toaccomplish the following task?

A. ALTER TABLE table_name MODIFY (column_name ENCRYPT);

B. ALTER SYSTEM SET ENCRYPTION WALLET OPEN IDENTIFIED BY password;

C. CREATE TABLE table_name (column_name datatype ENCRYPT);

D. ALTER TABLE table_name ADD (column_name datatype ENCRYPT);

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 35Which of the following are the advantages of Oracle Database Vault? Each correct answer represents acomplete solution. Choose all that apply.

A. It disables the separation of duty.

B. It imposes multi-factor authorization by the use of flexible business rules.

C. It controls access to database and application data by highly privileged users.

D. It enables the separation of duty.

Answer: BCD

Section: (none)

Explanation/Reference:

QUESTION 36Which of the following features of Oracle Advanced Security Option protects the operating system datafiles?

A. Kerberos

B. Transparent Data Encryption

C. Network Encryption

D. RADIUS

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 37Sam works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as thedatabase server. Sam wants to protect the company's data by encrypting the physical data files created onthe operating system. Which of the following types of encryption should he use to accomplish the task?

A. Transparent Data Encryption (TDE) for tablespace

B. Network encryption

C. Transparent Data Encryption (TDE) for securefiles

D. Transparent Data Encryption (TDE) for column

Page 13: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 38Which of the following components of Oracle Database Vault is a Java application that is built on top ofthe Oracle Database Vault PL/SQL application programming interfaces (API)?

A. Oracle Database Vault Administrator (DVA)

B. Oracle Database Vault Access Control Components

C. Oracle Database Vault DVSYS and DVF Schemas

D. Oracle Database Vault Reporting and Monitoring Tools

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 39Which of the following utilities is used to obtain Kerberos tickets that are cached in the user's credentialcache from the key distribution center (KDC)?

A. okinit

B. orapki

C. okdstry

D. oklist

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 40Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as thedatabase server. Andrew has been assigned the task to apply a security feature to the database of theorganization to protect the database from insiders. This security feature should also mitigate severalsecurity risks. Which of the following security features should he adopt to accomplish the task?

A. Advanced Security Option

B. Database Vault

C. Audit Vault

D. Enterprise Data Masking Pack

Answer: C

Section: (none)

Explanation/Reference:

Page 14: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

QUESTION 41Sam works as an Application Database Administrator for uCertify Inc. The company uses Oracle 11g asthe database. Sam uses data masking pack to reduce the risk of handling important information at thetime of application development. Which of the following features should Sam hold as an administrator?Each correct answer represents a complete solution. Choose all that apply.

A. Engraved with the knowledge of the database objects

B. Adds extensions to packaged applications

C. Adds additional custom database objects

D. Recommends the data to be hidden and protected

Answer: ABC

Section: (none)

Explanation/Reference:

QUESTION 42Which of the following options employs labeling concepts used by government and defense organizationsto protect sensitive information and to provide data separation?

A. Oracle Database Vault Security

B. Oracle Audit Vault Security

C. Oracle Advanced Security

D. Oracle Label Security

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 43Rick works as a Database Administrator in Dolliver Inc. The company uses Oracle 11g on its databaseserver. There is a "customer_detail" table in the database. Rick wants to mask the customer number in thetable in such a way that it gets masked to the same value across the entire database. Which maskingtechnique of Data Masking Pack should he apply to accomplish the task?

A. Deterministic masking

B. Shuffling

C. Condition-based masking

D. Compound masking

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 44Andrew works as a Database Administrator for Business Software Solutions Ltd. The company usesOracle 11g as the database. Andrew applied Oracle Data Masking Pack to the database so that to putback the fictitious data in place of sensitive data. Which of the following other benefits can this maskprovides to the database?Each correct answer represents a complete solution. Choose all that apply.

Page 15: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

A. Proactive problem identification.

B. Does not affect the production database.

C. Increases the productivity of the Database administrator through the masking of sensitive d ata.

D. Reduces the risk of handling important information when the production data is copied into a nonproduction environment.

Answer: BCD

Section: (none)

Explanation/Reference:

QUESTION 45Which of the following features differentiates TDE column encryption from TDE tablespace encryption?Each correct answer represents a complete solution. Choose all that apply.

A. The default encryption algorithm for TDE column encryption is AES128 whereas in TDE tablespaceencryption it is AES 192 .

B. In TDE column encryption the encryption candidates are not foreign-key columns whereas in TDEtablespace encryption they are foreign key columns.

C. In TDE column encryption the location of sensitive information is known whereas in TDE tablespaceencryption it is known.

D. The indexes of encryption candidates are functional indexes in TDE column encryption whereas inTDE tablespace encryption the indexes are normal B-tree indexes.

Answer: BC

Section: (none)

Explanation/Reference:

QUESTION 46Andrew works as a Database Administrator in Infotech Inc. The company uses Oracle 11g as its database.Andrew applied the Oracle Advanced Security for the protection of the database. Its also required to applyauthentication methods to authenticate users for the database protection. Which of the followingauthentication methods should he adopt to accomplish the following task?Each correct answer represents a complete solution. Choose all that apply.

A. Pre-shared key

B. Secure Sockets Layer

C. Kerberos

D. RADIUS

Answer: BCD

Section: (none)

Explanation/Reference:

QUESTION 47Rick works as a Database Administrator in Dolliver Inc. The company uses Oracle 11g on its databaseserver. There is a "customer_detail" table in the database. Rick wants to mask the customer number in thetable in such a way that it gets masked to the same value across the entire database. Which maskingtechnique of Data Masking Pack should he apply to accomplish the task?

Page 16: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

A. Condition-based masking

B. Compound masking

C. Shuffling

D. Deterministic masking

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 48You have a system installed with Oracle 11g. You are concerned about the security of the databaseinstances in your system. You plan to use Oracle Database Vault to create several components to managethe security of the database instances. Which of the following components can be created using OracleDatabase Vault? Each correct answer represents a complete solution. Choose all that apply.

A. RMAN

B. Factors

C. Command rules

D. Realms

Answer: BCD

Section: (none)

Explanation/Reference:

QUESTION 49Which of the following security features are of Oracle Advanced Security that are used to solve thesecurity challenges enhanced by Security in Enterprise Grid Computing Environments, Security in anIntranet or Internet Environment, and Common Security Threats? Each correct answer represents acomplete solution. Choose two.

A. Protecting Audit data from tampering

B. Separation of Duty

C. Strong Authentication

D. Data Encryption

Answer: CD

Section: (none)

Explanation/Reference:

QUESTION 50David works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as thedatabase server. David wants to adopt security options so as to protect the database of the company.Which of the following security options should he adopt to accomplish the task? Each correct answerrepresents a complete solution. Choose all that apply.

A. Advanced Security Option

B. Audit Vault

Page 17: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

C. Chain of trust

D. Database Vault

Answer: ABD

Section: (none)

Explanation/Reference:

QUESTION 51Which of the following authentication methods supported by Oracle Advanced Security provides thebenefit of single sign-on (SSO) capability, to enable users to access multiple accounts and applicationswith a single password? Each correct answer represents a complete solution. Choose all that apply.

A. Entrust/PKI

B. Remote Authentication Dial-In User Service

C. Kerberos

D. Secure Sockets Layer

Answer: AC

Section: (none)

Explanation/Reference:

QUESTION 52You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in thecompany. You want to protect data from privileged users through some preventive controls and alsosecure the database transparently. Which of the following security options will you adopt to accomplish thetask?

A. Advanced Security

B. Audit Vault

C. Database Vault

D. Enterprise Manager Data Masking Pack

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 53Which of the following features of Oracle Advanced Security Option protects the operating system datafiles?

A. Kerberos

B. Network Encryption

C. RADIUS

D. Transparent Data Encryption

Answer: D

Section: (none)

Explanation/Reference:

Page 18: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

QUESTION 54You work as a Database Administrator for Infotech Inc. The company uses Oracle 11g as its database.The company is required to increase efficiency and lower costs, to automate business processes for whichit has to face some security challenges. Which of the following security challenges the company has toface in today's enterprise computing environments?

A. Security in Enterprise Grid Computing Environments

B. Security in an Intranet or Internet Environment

C. Key hiding

D. Common Security Threats

Answer: ABD

Section: (none)

Explanation/Reference:

QUESTION 55Which method should be adopted to retrieve all those rows whose sensitive columns have a null valueand which are restricted by Virtual Private Database security?

A. Transparent Data Encryption

B. Column masking

C. Access Control List

D. Transparent Tablespace Encryption

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 56You works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the databaseserver .It is required to configure the Kerberos authentication on a database client and server. Which ofthe following tools will you adapt to accomplish this task?

A. Oracle Net Manager

B. Oracle Wallet Manager

C. Oracle Enterprise Manager

D. Oracle Connection Manager

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 57Sam works as a Database Administrator for Tech-Mart Inc. The company uses an Oracle 11g databaseserver. Andrew wants to secure the data on the network from unauthorized users by encrypting it. Whichof the following security option should he use to accomplish the following task?

Page 19: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

A. Oracle Audit Vault

B. Oracle Advanced Security

C. Oracle Data Masking Pack

D. Oracle Database Vault

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 58Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as thedatabase server. Andrew has been assigned the task to apply a security feature to the database of theorganization to protect the database from insiders. This security feature should also mitigate severalsecurity risks. Which of the following security features should he adopt to accomplish the task?

A. Advanced Security Option

B. Audit Vault

C. Database Vault

D. Enterprise Data Masking Pack

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 59Andrew works as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as itsdatabase. Andrew applied the Oracle Audit Vault security to the database so that alteration or modificationof the data is not allowed. Which of the following features are supported by this security option?

A. It simplifies compliance reporting.

B. It helps in early detection of threats.

C. It couples fine-grained access control.

D. It provides encryption technique.

Answer: AB

Section: (none)

Explanation/Reference:

QUESTION 60Sam works as an Application Database Administrator for uCertify Inc. The company uses Oracle 11g asthe database. Sam uses data masking pack to reduce the risk of handling important information at thetime of application development. Which of the following features should Sam hold as an administrator?Each correct answer represents a complete solution. Choose all that apply.

A. Recommends the data to be hidden and protected

B. Engraved with the knowledge of the database objects

C. Adds additional custom database objects

Page 20: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

D. Adds extensions to packaged applications

Answer: BCD

Section: (none)

Explanation/Reference:

QUESTION 61David works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as thedatabase server. David wants to adapt such a security option that will provide no application changes tothe database, built-in key management, and high performance to the database. Which security optionshould he adopt to accomplish the task?

A. Label Security

B. Advanced Security Option

C. Database Vault

D. Audit Vault

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 62Which of the following features are required to mask data by making use of Oracle Data Masking Pack ?

A. Masking subnet

B. Masking definitions

C. Masking backward

D. Masking format libraries

Answer: BD

Section: (none)

Explanation/Reference:

QUESTION 63Which of the following are the guidelines of Password Management Policy that enhances the walletpassword management module?Each correct answer represents a complete solution. Choose all that apply.

A. The alphanumeric character mix is required.

B. The minimum password length required is of 6 characters.

C. The maximum password length is unlimited.

D. The minimum password length required is of 8 characters.

Answer: ACD

Section: (none)

Explanation/Reference:

Page 21: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

QUESTION 64Which of the following are the advantages of Oracle Database Vault? Each correct answer represents acomplete solution. Choose all that apply.

A. It controls access to database and application data by highly privileged users.

B. It disables the separation of duty.

C. It enables the separation of duty.

D. It imposes multi-factor authorization by the use of flexible business rules.

Answer: ACD

Section: (none)

Explanation/Reference:

QUESTION 65You work as a Security Administrator for uCertify Inc. The company uses Oracle 11g as the databaseserver. You have been asked to use an application that creates public and private key pairs and can bealso used for storage and management of certificate authority certificates. Which of the followingapplications will you use to accomplish this task?

A. Oracle Connection Manager

B. Oracle Net Manager

C. Oracle Wallet Manager

D. Oracle Enterprise Manager

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 66Sam works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as thedatabase server. Sam wants to protect the company's data by encrypting the physical data files created onthe operating system. Which of the following types of encryption should he use to accomplish the task?

A. Transparent Data Encryption (TDE) for securefiles

B. Transparent Data Encryption (TDE) for tablespace

C. Network encryption

D. Transparent Data Encryption (TDE) for column

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 67Which of the following tasks is performed by using ALTER SYSTEM SET ENCRYPTION KEYcertificate_ID IDENTIFIED BY password; SQL command?

A. Encrypts unencrypted existing column

B. Set or Reset master encryption key

Page 22: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

C. Create table and encrypt column.

D. Set or Reset master encryption key to use PKI certificate

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 68You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its databaseserver. The server contains a database named "Company_Project_Details". The database is sharedamong multiple departments of the company for regular updation. Looking at the security issues of thedatabase, you have been assigned the task to apply some security solution to the database.To accomplish the task, you plan to apply Database Label Security on this database. Which of thefollowing components of the Database Label Security should you apply in order to secure this database?Each correct answer represents a complete solution. Choose all that apply.

A. Source database

B. Levels

C. Groups

D. Compartments

Answer: BCD

Section: (none)

Explanation/Reference:

QUESTION 69Which of the following features differentiates TDE column encryption from TDE tablespace encryption?Each correct answer represents a complete solution. Choose all that apply.

A. In TDE column encryption the location of sensitive information is known whereas in TDE tablespaceencryption it is known.

B. In TDE column encryption the encryption candidates are not foreign-key columns whereas in TDEablespace encryption they are foreign key columns.

C. The default encryption algorithm for TDE column encryption is AES128 whereas in TDE tablespacencryption it is AES 192 .

D. The indexes of encryption candidates are functional indexes in TDE column encryption whereas in DEtablespace encryption the indexes are normal B-tree indexes.

Answer: AB

Section: (none)

Explanation/Reference:

QUESTION 70You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its atabaseserver. During the management of company's database its required to add encrypted olumn to existingtable for the protection of database files. Which of the following SQL commands ill you use to accomplishthe following task?

A. ALTER SYSTEM SET ENCRYPTION WALLET OPEN IDENTIFIED BY password;

Page 23: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

B. ALTER TABLE table_name ADD (column_name datatype ENCRYPT);

C. CREATE TABLE table_name (column_name datatype ENCRYPT);

D. ALTER TABLE table_name MODIFY (column_name ENCRYPT);

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 71Streams engine decrypt the encrypted data to allow data transformation (character sets, database ersions,platforms, etc.) and it is not encrypted at the time it is made transmitted to the other atabases. Which ofthe following types of encryption is needed to resolve this issue?

A. Transparent Data Encryption

B. TDE Column Encryption

C. Network Encryption

D. TDE Tablespace Encryption

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 72Sam works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as thedatabase server. Sam wants to adopt a security feature on the database that enforces the security rules,regardless of the way the data is accessed. Which of the following security features should he adopt toaccomplish the task?

A. Real Application Cluster (RAC)

B. Virtual Private Database (VPD)

C. Enhanced security features with execution context

D. Label Security

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 73Which of the following is NOT a feature of the Data Masking Pack?

A. Automated patching for Oracle products and the operating system

B. Sophisticated Masking Techniques

C. Secure High Performance Mask Execution

D. Comprehensive and Extensible Mask Library

Answer: A

Section: (none)

Page 24: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

Explanation/Reference:

QUESTION 74Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as thedatabase server and deals with the development of various database applications. During suchdevelopments, production data is copied into other non-production environments. This leads to severalconfidential risks. Andrew has been assigned the task to minimize the risk of handling such sensitiveinformation. Which pack of Enterprise Manager should he adopt to accomplish the task?

A. Oracle Configuration Management Pack

B. Oracle Diagnostic Pack

C. Oracle Change Management Pack

D. Oracle Data Masking Pack

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 75Which of the following options employs labeling concepts used by government and defense organizationsto protect sensitive information and to provide data separation?

A. Oracle Advanced Security

B. Oracle Audit Vault Security

C. Oracle Database Vault Security

D. Oracle Label Security

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 76Which of the following utilities is used to obtain Kerberos tickets that are cached in the user's credentialcache from the key distribution center (KDC)?

A. oklist

B. okinit

C. okdstry

D. orapki

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 77Andrew works as a Database Administrator for Business Software Solutions Ltd. The company usesOracle 11g as the database. Andrew applied Oracle Data Masking Pack to the database so that to put

Page 25: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

back the fictitious data in place of sensitive data. Which of the following other benefits can this maskprovides to the database?Each correct answer represents a complete solution. Choose all that apply.

A. Proactive problem identification.

B. Increases the productivity of the Database administrator through the masking of sensitive d ata.

C. Reduces the risk of handling important information when the production data is copied into a nonproduction environment.

D. Does not affect the production database.

Answer: BCD

Section: (none)

Explanation/Reference:

QUESTION 78Which of the following components of Oracle Database Vault is a Java application that is built on top ofthe Oracle Database Vault PL/SQL application programming interfaces (API)?

A. Oracle Database Vault DVSYS and DVF Schemas

B. Oracle Database Vault Reporting and Monitoring Tools

C. Oracle Database Vault Access Control Components

D. Oracle Database Vault Administrator (DVA)

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 79Which of the following security options provides easy compliance by automating access control?

A. Oracle Audit Vault

B. Oracle Database Vault

C. Oracle Data masking Pack

D. Oracle Advanced Security

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 80Which of the following features is supported by Oracle Label Security?

A. It provides advanced spatial analysis features for complex geographic information systems (GIS)applications.

B. It provides static and dynamic caching of Oracle database tables.

C. It provides sophisticated and flexible security based on row labels for fine-grained access c ontrol.

D. It provides scalable performance as the demand for database throughput grows.

Page 26: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 81Which of the following database options provides multi-level security?

A. Oracle On-Line Analytical Processing

B. Oracle Partitioning

C. Oracle Label Security

D. Oracle Real Application Clusters

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 82Which of the following security options provides the encryption of disk-based backups of the database?

A. Oracle Enterprise Manager

B. Oracle Database Vault

C. Oracle Audit Vault

D. Oracle Advanced

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 83Which security feature should be used in the environment where multiple users access the same databaseand only specific information is available to each group?

A. Column masking

B. Label Security

C. Virtual Private Database

D. Audit Vault

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 84Which testing can help customers to implement database changes with minimum risk?

A. Real Application Testing

B. Networked Application Testing

Page 27: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

C. Cloud Application Testing

D. Unit Testing

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 85Which of the following is a feature of the Operating system audit log collection (OSAUD)?

A. It retrieves audit records from fine-grained audit trails.

B. It uses Oracle LogMiner and Streams to retrieve logical change records (LCRs) from the redo log files.

C. It retrieves audit records from the database audit trail.

D. It retrieves audit records from the OS audit file.

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 86Which of the following is an Oracle Audit Vault Server component?

A. Audit Vault Auditor

B. Oracle Database

C. Audit Data Collection

D. SQL Server

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 87Which of the following features is supported by Oracle Audit Vault?

A. Hardware Security Module (HSM) TDE Master Key Protection

B. Lower IT costs with audit policies

C. Transport Layer Security (TLS) Support

D. SSL/TLS network encryption

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 88Which of the following security products builds customer reports against an open warehouse schema?

Page 28: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

A. Oracle Database Vault Security

B. Oracle Label Security

C. Oracle Audit Vault Security

D. Oracle Advanced Security

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 89Which of the following components includes Oracle Container for J2EE (OC4J) and Oracle DatabaseClient components, and is deployed within its own directory?

A. Audit Vault Server

B. Audit Vault Collector

C. Audit Vault Agent

D. Audit Vault Console

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 90Which of the following types of encryption is used to encrypt data in flight with native encryption?

A. Network encryption

B. Transparent data encryption

C. Endpoint encryption

D. Transparent tablespace encryption

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 91Which of the following encryption algorithms is used by transparent data encryption by default?

A. 3DES168

B. AES128

C. AES256

D. AES192

Answer: D

Section: (none)

Explanation/Reference:

Page 29: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

QUESTION 92Which of the following is the container in which transparent data encryption stores the master key?

A. Role

B. Realm

C. Schema

D. Wallet

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 93Which of the following commands is used to load the master encryption key after the database isrestarted?

A. ALTER SYSTEM SET ENCRYPTION WALLET OPEN IDENTIFIED

B. ALTER SYSTEM SET ENCRYPTION WALLET OPEN IDENTIFIED BY password

C. ALTER SYSTEM SET ENCRYPTION KEY IDENTIFIED BY password

D. ALTER SYSTEM SET ENCRYPTION WALLET CLOSE

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 94Which of the following features differentiates tablespace encryption from column encryption?

A. It is completely transparent to the application.

B. It allows index range scans on data.

C. It protects data in undo and redo logs.

D. Its master encryption key is stored in the Oracle wallet.

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 95Which of the following roles or privileges is created during installation and used for creating new databaseaccounts?

A. SYSDBA

B. DV_OWNER

C. SYSOPER

D. DV_ACCTMGR

Answer: D

Page 30: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

Section: (none)

Explanation/Reference:

QUESTION 96Which of the following is a functional grouping of database schemas and roles that must be secured for agiven application?

A. Role

B. Schema

C. Realm

D. Wallet

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 97Which of the following components involves command rule granularity?

A. Multi-Factor Authorization

B. Realms

C. Reporting

D. Auditing

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 98Which of the following tasks is assigned to the database administrator while using database vault?

A. Account management

B. Resource management

C. Security responsibilities

D. System management

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 99Which of the following regulations addresses unauthorized access to data?

A. Basel II - Internal Risk Management

B. Payment Card Industry Data Security Standard (PCI DSS)

Page 31: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

C. Sarbanes-Oxley Section 409

D. Gramm-Leach-Bliley

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 100Which of the following Enterprise Manager Packs supports masking and script generation?

A. Oracle Tuning

B. Oracle Change Management

C. Oracle Configuration Management

D. Oracle Data Masking

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 101Which of the following packs involves condition-based, deterministic, and compound masking echniques?

A. Oracle Provisioning

B. Oracle Tuning

C. Oracle Data Masking

D. Oracle Configuration Management

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 102Which of the following is an advantage of Data Masking Pack?

A. Automatically maintained workload history facilitates historical performance analysis.

B. Provides automatic tuning of SQL statements.

C. Eliminate errors by automating deployment of database changes across environments.

D. Rapid sharing of production data in compliance with data privacy regulations.

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 103Which of the following packs has the Clone and Mask workflow feature?

Page 32: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

A. Oracle Data Masking

B. Oracle Provisioning and Patch Automation

C. Oracle Tuning Pack

D. Oracle Change Management

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 104Which of the following options defines a data masking operation to be implemented on one or more tablesin a database?

A. Masking format libraries

B. Data Masking Workflow

C. Masking definition

D. Automatic Storage Management

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 105Andrew works as a Database Administrator for Dolliver Inc. The company uses Oracle 11g as itsdatabase. Andrew applied the Oracle Audit Vault security to the database so that alteration or modificationof the data is not allowed. Which of the following features are supported by this security option?

A. It helps in early detection of threats.

B. It provides encryption technique.

C. It simplifies compliance reporting.

D. It couples fine-grained access control.

Answer: AC

Section: (none)

Explanation/Reference:

QUESTION 106Which method should be adopted to retrieve all those rows whose sensitive columns have a null valueand which are restricted by Virtual Private Database security?

A. Transparent Tablespace Encryption

B. Access Control List

C. Transparent Data Encryption

D. Column masking

Answer: D

Section: (none)

Page 33: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

Explanation/Reference:

QUESTION 107Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as thedatabase server. Andrew has been assigned the task to apply a security feature to the database of theorganization to protect the database from insiders. This security feature should also mitigate severalsecurity risks. Which of the following security features should he adopt to accomplish the task?

A. Enterprise Data Masking Pack

B. Audit Vault

C. Database Vault

D. Advanced Security Option

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 108Andrew works as a Database Administrator for Business Software Solutions Ltd. The company usesOracle 11g as the database. Andrew applied Oracle Data Masking Pack to the database so that to putback the fictitious data in place of sensitive data. Which of the following other benefits can this maskprovides to the database?Each correct answer represents a complete solution. Choose all that apply.

A. Proactive problem identification.

B. Increases the productivity of the Database administrator through the masking of sensitive d ata.

C. Reduces the risk of handling important information when the production data is copied into a nonproduction environment.

D. Does not affect the production database.

Answer: BCD

Section: (none)

Explanation/Reference:

QUESTION 109Which of the following features are required to mask data by making use of Oracle Data Masking Pack ?

A. Masking subnet

B. Masking backward

C. Masking format libraries

D. Masking definitions

Answer: CD

Section: (none)

Explanation/Reference:

QUESTION 110

Page 34: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

Which of the following features differentiates TDE column encryption from TDE tablespace encryption?Each correct answer represents a complete solution. Choose all that apply.

A. In TDE column encryption the location of sensitive information is known whereas in TDE tablespaceencryption it is known.

B. In TDE column encryption the encryption candidates are not foreign-key columns whereas in TDEtablespace encryption they are foreign key columns.

C. The default encryption algorithm for TDE column encryption is AES128 whereas in TDE tablespaceencryption it is AES 192 .

D. The indexes of encryption candidates are functional indexes in TDE column encryption whereas inTDE tablespace encryption the indexes are normal B-tree indexes.

Answer: AB

Section: (none)

Explanation/Reference:

QUESTION 111Which of the following options employs labeling concepts used by government and defense organizationsto protect sensitive information and to provide data separation?

A. Oracle Audit Vault Security

B. Oracle Advanced Security

C. Oracle Database Vault Security

D. Oracle Label Security

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 112Sam works as a Database Administrator for Tech-Mart Inc. The company uses an Oracle 11g databaseserver. Andrew wants to secure the data on the network from unauthorized users by encrypting it. Whichof the following security option should he use to accomplish the following task?

A. Oracle Audit Vault

B. Oracle Data Masking Pack

C. Oracle Advanced Security

D. Oracle Database Vault

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 113Sam works as an Application Database Administrator for uCertify Inc. The company uses Oracle 11g asthe database. Sam uses data masking pack to reduce the risk of handling important information at thetime of application development. Which of the following features should Sam hold as an administrator?Each correct answer represents a complete solution. Choose all that apply.

Page 35: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

A. Adds extensions to packaged applications

B. Recommends the data to be hidden and protected

C. Engraved with the knowledge of the database objects

D. Adds additional custom database objects

Answer: ACD

Section: (none)

Explanation/Reference:

QUESTION 114You works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as the databaseserver .It is required to configure the Kerberos authentication on a database client and server. Which ofthe following tools will you adapt to accomplish this task?

A. Oracle Wallet Manager

B. Oracle Connection Manager

C. Oracle Net Manager

D. Oracle Enterprise Manager

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 115Which of the following security features are of Oracle Advanced Security that are used to solve thesecurity challenges enhanced by Security in Enterprise Grid Computing Environments, Security in anIntranet or Internet Environment, and Common Security Threats? Each correct answer represents acomplete solution. Choose two.

A. Protecting Audit data from tampering

B. Separation of Duty

C. Strong Authentication

D. Data Encryption

Answer: CD

Section: (none)

Explanation/Reference:

QUESTION 116Streams engine decrypt the encrypted data to allow data transformation (character sets, databaseversions, platforms, etc.) and it is not encrypted at the time it is made transmitted to the other databases.Which of the following types of encryption is needed to resolve this issue?

A. TDE Tablespace Encryption

B. Network Encryption

C. TDE Column Encryption

D. Transparent Data Encryption

Page 36: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 117Sam works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as thedatabase server. Sam wants to adopt a security feature on the database that enforces the security rules,regardless of the way the data is accessed. Which of the following security features should he adopt toaccomplish the task?

A. Enhanced security features with execution context

B. Virtual Private Database (VPD)

C. Real Application Cluster (RAC)

D. Label Security

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 118Which of the following tasks is performed by using ALTER SYSTEM SET ENCRYPTION KEYcertificate_ID IDENTIFIED BY password; SQL command?

A. Set or Reset master encryption key to use PKI certificate

B. Encrypts unencrypted existing column

C. Create table and encrypt column.

D. Set or Reset master encryption key

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 119Sam works as a Database Administrator for Gentech Inc. The company is using Oracle 11g as thedatabase server. Sam wants to protect the company's data by encrypting the physical data files created onthe operating system. Which of the following types of encryption should he use to accomplish the task?

A. Network encryption

B. Transparent Data Encryption (TDE) for tablespace

C. Transparent Data Encryption (TDE) for column

D. Transparent Data Encryption (TDE) for securefiles

Answer: B

Section: (none)

Explanation/Reference:

Page 37: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

QUESTION 120Rick works as a Database Administrator in Dolliver Inc. The company uses Oracle 11g on its databaseserver. There is a "customer_detail" table in the database. Rick wants to mask the customer number in thetable in such a way that it gets masked to the same value across the entire database. Which maskingtechnique of Data Masking Pack should he apply to accomplish the task?

A. Condition-based masking

B. Compound masking

C. Shuffling

D. Deterministic masking

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 121You work as a Database Administrator for uCertify Inc. The company uses Oracle 11g on its databaseserver. The server contains a database named "Company_Project_Details". The database is sharedamong multiple departments of the company for regular updation. Looking at the security issues of thedatabase, you have been assigned the task to apply some security solution to the database.To accomplish the task, you plan to apply Database Label Security on this database. Which of thefollowing components of the Database Label Security should you apply in order to secure this database?Each correct answer represents a complete solution. Choose all that apply.

A. Groups

B. Levels

C. Source database

D. Compartments

Answer: ABD

Section: (none)

Explanation/Reference:

QUESTION 122David works as a Database Administrator for uCertify Inc. The company is using Oracle 11g as thedatabase server. David wants to adopt security options so as to protect the database of the company.Which of the following security options should he adopt to accomplish the task? Each correct answerrepresents a complete solution. Choose all that apply.

A. Audit Vault

B. Advanced Security Option

C. Database Vault

D. Chain of trust

Answer: ABC

Section: (none)

Explanation/Reference:

QUESTION 123

Page 38: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in thecompany. You want to protect data from privileged users through some preventive controls and alsosecure the database transparently. Which of the following security options will you adopt to accomplish thetask?

A. Audit Vault

B. Enterprise Manager Data Masking Pack

C. Database Vault

D. Advanced Security

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 124Which of the following are the guidelines of Password Management Policy that enhances the walletpassword management module?Each correct answer represents a complete solution. Choose all that apply.

A. The maximum password length is unlimited.

B. The minimum password length required is of 6 characters.

C. The alphanumeric character mix is required.

D. The minimum password length required is of 8 characters.

Answer: ACD

Section: (none)

Explanation/Reference:

QUESTION 125Which of the following security options provides easy compliance by automating access control?

A. Oracle Database Vault

B. Oracle Data masking Pack

C. Oracle Advanced Security

D. Oracle Audit Vault

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 126Rick works as a Database Administrator in Dolliver Inc. The company uses Oracle 11g on its databaseserver. There is a "customer_detail" table in the database. Rick wants to mask the customer number in thetable in such a way that it gets masked to the same value across the entire database. Which maskingtechnique of Data Masking Pack should he apply to accomplish the task?

A. Condition-based masking

B. Compound masking

Page 39: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

C. Shuffling

D. Deterministic masking

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 127Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as thedatabase server. Andrew has been assigned the task to apply a security feature to the database of theorganization to protect the database from insiders. This security feature should also mitigate severalsecurity risks. Which of the following security features should he adopt to accomplish the task?

A. Database Vault

B. Advanced Security Option

C. Enterprise Data Masking Pack

D. Audit Vault

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 128Which of the following is NOT a feature of the Data Masking Pack?

A. Secure High Performance Mask Execution

B. Comprehensive and Extensible Mask Library

C. Automated patching for Oracle products and the operating system

D. Sophisticated Masking Techniques

Answer: C

Section: (none)

Explanation/Reference:

QUESTION 129You are a Database Administrator in Dolliver Inc. Oracle 11g is installed as the database server in thecompany. You want to protect data from privileged users through some preventive controls and alsosecure the database transparently. Which of the following security options will you adopt to accomplish thetask?

A. Audit Vault

B. Database Vault

C. Advanced Security

D. Enterprise Manager Data Masking Pack

Answer: B

Section: (none)

Explanation/Reference:

Page 40: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

QUESTION 130Which of the following is NOT a feature of the Data Masking Pack?

A. Automated patching for Oracle products and the operating system

B. Sophisticated Masking Techniques

C. Secure High Performance Mask Execution

D. Comprehensive and Extensible Mask Library

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 131Which of the following security options provides easy compliance by automating access control?

A. Oracle Audit Vault

B. Oracle Database Vault

C. Oracle Data masking Pack

D. Oracle Advanced Security

Answer: A

Section: (none)

Explanation/Reference:

QUESTION 132Which of the following Enterprise Manager Packs supports masking and script generation?

A. Oracle Tuning

B. Oracle Change Management

C. Oracle Configuration Management

D. Oracle Data Masking

Answer: D

Section: (none)

Explanation/Reference:

QUESTION 133Andrew works as a Database Administrator for Tech Mart Inc. The company uses Oracle 11g as thedatabase server. Andrew has been assigned the task to apply a security feature to the database of theorganization to protect the database from insiders. This security feature should also mitigate severalsecurity risks. Which of the following security features should he adopt to accomplish the task?

A. Enterprise Data Masking Pack

B. Audit Vault

C. Database Vault

Page 41: Oracle.realExamQuestions.1Z0 528.v2011!11!09.by.charlie

D. Advanced Security Option

Answer: B

Section: (none)

Explanation/Reference:

QUESTION 134Which of the following security features are of Oracle Advanced Security that are used to solve thesecurity challenges enhanced by Security in Enterprise Grid Computing Environments, Security in anIntranet or Internet Environment, and Common Security Threats? Each correct answer represents acomplete solution. Choose two.

A. Protecting Audit data from tampering

B. Separation of Duty

C. Strong Authentication

D. Data Encryption

Answer: CD

Section: (none)

Explanation/Reference:

QUESTION 135Which of the following security options provides easy compliance by automating access control?

A. Oracle Database Vault

B. Oracle Data masking Pack

C. Oracle Advanced Security

D. Oracle Audit Vault

Answer: D

Section: (none)

Explanation/Reference: