Oracle
1Z0-116
150 Minutes
90
Oracle Database Security Administration
A: They ate used to control access by users to external network services and resources from the database through PL/SQL.
B: They are used to provide access to database packages.
C: They are used to control the usage of UTL_TCP, ITL_HTTP, and UTL_INADDR.
D: They are used to configure proxy for PL/SQL network utility packages.
A: PARAMETER_NAM=>'CHECKPOINT'
B: OBJECT_OWNER=>'SYS
C: CLAUSE_NAME=>'CHECKPOINT'
D: CLAUSE_NAME=>'SYSTEM'
E: COMMANI>=>' ALTER SYSTEM'
F: OBJECT_NAME=>'CHECKPOINT'
G: COMMAND=>'ALTER'
A: to authenticate externally Identified users locally
B: to authenticate nonprivllegcd database users locally
C: to authenticate administrative privileged users remotely
D: to authenticate externally Identified users remotely
E: to authenticate nonprivileged database users remotely
F: to authenticate administrative privileged users locally
A: Data Redaction
B: Data Guard
C: Real Application Clusters
D: Transparent Data Encryption
E: Data Masking & Subsetting
F: Table Partitioning
G: Database Vault
H: Real Application Testing