A. The rekey process only applies to the SYS.SCHEDULES$ credential table.
B. The process of rekeylng does not automatically open the keystore.
C. The rekey process prompts the user to provide a new key algorithm If needed.
D. The credential data encryption process does not de-obfuscate the obfuscated passwords before re-encrypts begin.
E. Credential Data Is automatically encrypted using aes2S6.
F. The rekey process only applies to the sys.ltnks CREDENTUIALS table.
G. Both sys. links and sys . SCHEDULER_CREDENTIAL tables are rekeyed.
A. Only DBA users can query SESSION_CONTEXT view contents.
B. Enterprise User Security is not configured and used for the user.
C. An administrator issues the ALTER SYSTEM FLUSH global context statement.
D. The set_empno_crx_proc procedure must be in a package.
E. The application context is global.
A. Set REMOTE_OS_AUTHENT = FALSE In the init.ora file.
B. Set sqlnet.aothentication_sebvices=(NONe» In sqlnet.ora on the database server.
C. Remove all OS users from OS groups: osdba, osoper, osbackupdba, osdgdba, osrmdba, OSASMADMIN, OSASMDBA.
D. Set REMOTE_LOGIH_PASSWORDFILE = EXCLUSIVE In the init.ora file.
A. It must be run by an OS user with read permissions on files and directories under ORACLE_HOME.
B. It runs only on UNIX/Linux systems.
C. It must be run on the server that contains the database.
D. It runs only on Windows systems.
E. It must connect to the database using a SYSDBA connection.
A. Verify which clients have encrypted connections using the view vSsession_CONNECT_INFO.
B. Upgrade all OCI-basod clients to match the database version.
C. Set the client side sqinec.ora parameter SQLNET.ENCRYPTION _client = required.
D. Modify all JDBC Thin based clients to include network encryption parameters in Java.
E. Set the server side sqinot.ora parameter SQLNET.CRYPTO_CHECKSOM_SERVER - accepted.
F. Configure the listener with an endpoint for protocol TCPS.
G. Set the server side sqinet.oia parameter sqlnet.encryption_server = requested.
A. compartment and group
B. compartment
C. level, compartment, and group
D. level and compartment
E. level
F. level and group
G. group
A. AUDIT POLICY hr_emp_pol EXCEPT hr;
B. CREATE AUDIT POLICY hr_omp_pol ACTIONS UPDATE ON hr.employoes;
C. AUDIT CONTEXT NAMESPACE hr_Ct:x ATTRIBUTES hr_app_id NAMESPACE USERENV ATTRIBUTES ALL BY hr;
D. AUDIT POLICY hr_emp_pol BY hr;
E. AUDIT CONTEXT NAMESPACE hr_ctx ATTRIBUTES hr_app_id NAMESPACE USERENV ATTRIBUTES current:_user( db_name BY hr;
F. AUDIT CONTEXT NAMESPACE hr_ctx ATTRIBUTES hr_app_id, current_user, db_name BY hr
G. CREATE AUDIT POLICY hr_emp_pol ACTIONS SELECT ON hr. employees;
A. data realms
B. policies
C. schemas
D. privileges
E. roles
F. column constraints
G. data realm constraints
A. It must have the Database Vault option enabled.
B. It cannot be used to capture the privileges that have been exercised on precompiled database objects.
C. Privilege analysis data for dropped objects are kept.
D. If a privilege is captured during run time, it is saved under the run-time capture name.
E. It shows the grant paths to the privileges and suggests which grant path to keep.
F. It can be used after you install the Oracle Database without any additional database configuration steps.