Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
1z0-528 Latest Exam (Jan 2018)

[Free] 2018(Jan) EnsurePass Braindumps Oracle 1z0-528 Dumps with VCE and PDF 31-40

February 18, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-528
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/1z0-528.html

Oracle Database 11g Security Essentials

Question No: 31

Which security requirements can affect companies regardless of their location in the world?

  1. PCI

  2. HIPAA

  3. ISO-9000

  4. GLBA

Answer: A Explanation:

Payment Card Industry security standards can affect companies worldwide.

Question No: 32

Which four types of agents are supported by Oracle Audit Vault for Oracle databases?

  1. Redo

  2. Database audit files

  3. Oracle audit trail from OS

  4. Operating system SYSLOG flies

  5. ODBC audit files

Answer: A,B,C,D Explanation:

Audit Vault supports redo, database and operating system based auditing for the Oracledatabase.

Question No: 33

How do you handle partitions with encrypted tablespaces?

  1. You cannot have partitions in encrypted tablespaces.

  2. You can have different partitions in different tablespaces, both encrypted and not encrypted.

  3. All partitions must be in the same encrypted tablespace.

  4. You can have partitions in multiple tablespaces, as long as all of them are encrypted.

Answer: B Explanation:

You can have different partitions in different tablespaces, both encrypted and not encrypted.

Question No: 34

Which component of Oracle Audit Vault may require multiple instances per targeted database server machine?

  1. Collector

  2. Agent

  3. Orade Audit Vault Server

  4. Orade Audit Vault consoiidator

Answer: A Explanation:

You configure one collection agent for each host and one or more collectors for eachindividual source database. For example, if a host contains four databases, then youwould configure one collection agent for that host and one or more collectors for eachof the four databases. The number of collectors that you configure and the collectionagent that you use to manage them depends on the source database type and the audittrails that you want to collect from it.

Question No: 35

The following actions are part of the data masking process:

  1. Re-create masked table copy amp; populate using renamed original table and mapping table.

  2. Disable constraints on table amp; rename table.

  3. Build mapping table containing original sensitive and masked values using masking routines.

  4. Drop renamed table and mapping table.

  5. Restore constraints based on original table amp; collect statistics. In which order are these actions performed?

  6. A-B-C-D-E

  7. E-D-C-B-A

  8. A-C-E-B-D

  9. C-B-A-D-E

  10. C-A-B-E-D

Answer: E Explanation:

The following basic steps guide you through the data masking process, with references toother sections for supporting information.

Review the application database and identify the sources of sensitive information. Define mask formats for the sensitive data. The mask formats may be simple or complexdepending on the information security needs of the organization.

For more information, see quot;Creating New Masking Formatsquot; and quot;Using Oracle-supplied PredefinedMasking Formatsquot;.

Create a masking definition to associate table columns to these mask formats. Data maskingdetermines the database foreign key relationships and adds foreign key columns to themask.

For more information, see quot;Masking with an Application Data Model and Workloadsquot;. Save the masking definition and generate the masking script.

Verify if the masked data meets the information security requirements. Otherwise, refine themasking definition, restore the altered tables, and reapply the masking definition until theoptimal set of masking definitions has been identified.

Clone the production database to a staging area, selecting the masking definition to be usedafter cloning. Note that you can clone using Enterprise Manager, which enables you to addmasking to the Enterprise Manager clone workflow. However, if you clone outside ofEnterprise Manager, you must initiate masking from Enterprise Manager after cloning iscomplete. The cloned database should be controlled with the same privileges as theproduction system, because it still contains sensitive production data.

After cloning, be sure to change the passwords as well as update or disable any databaselinks, streams, or references to external data sources. Back up the cloned database, orminimally the tables that contain masked data. This can help you restore the original data ifthe masking definition needs to be refined further.

For more information, see quot;Cloning the Production Databasequot;.

After masking, test all of your applications, reports, and business processes to ensure theyare functional. If everything is working, you can export the masking definition to keep it as aback-up.

After masking the staging site, make sure to drop any tables named MGMT_DM_TT beforecloning to a test region. These temporary tables contain a mapping between the originalsensitive column value and the mask values, and are therefore sensitive in nature.

During masking, Enterprise Manager automatically drops these temporary tables for you withthe default quot;Drop temporary tables created during maskingquot; option. However, you canpreserve these temporary tables by deselecting this option. In this case, you are responsiblefor deleting the temporary tables before cloning to the test region.

After masking is complete, ensure that all tables loaded for use by the substitute columnformat or table column format are going to be dropped. These tables contain the maskvalues that table column or substitute formats will use. It is recommended that you purge thisinformation for security reasons.

For more information, see quot;Deterministic Masking Using the Substitute Formatquot;.

Clone the database to a test region, or use it as the new test region. When cloning thedatabase to an external or unsecured site, you should use Export or Import. Only supply thedata in the database, rather than the database files themselves.

As part of cloning production for testing, provide the masking definition to the applicationdatabase administrator to use in masking the database.

Question No: 36

Which component of Oracle Audit Vault requires only one instance per targeted database server machine?

  1. Collector

  2. Agent

  3. Oracle Audit Vault Server

  4. Oracle Audit Vault consolidator

Answer: B Explanation:

You configure one collection agent for each host and one or more collectors for eachindividual source database. For example, if a host contains four databases, then youwould configure one collection agent for that host and one or more collectors for eachof the four databases. The number of collectors that you configure and the collectionagent that you use to manage them depends on the source database type and the audittrails that you want to collect from it.

Question No: 37

You can encrypt any data type with tablespace encryption.

  1. TRUE

  2. FALSE

Answer: A Explanation:

TDE tablespace encryption encrypts all data stored in an encrypted tablespace. Thisincludes internal large objects (LOBs) such as BLOBs and CLOBs.

Question No: 38

Which of the following statements is true about the relationship between an Oracle wallet and an HSM device?

  1. You get additional security by having an Oracle wallet and an HSM device

  2. The Oracle wallet provides more security than an HSM device

  3. You can have either an Oracle wallet or an HSM device

  4. ou create a master key in an Oracle wallet with an ALTER SYSTEM command, but use

a hardware-specificcommand for the same function with an HSM device.

Answer: A Explanation:

HSM is a more secure alternative to the Oraclewallet. TDE can use HSM to provide enhanced security for sensitive data. An HSM is used tostore the master encryption key used for TDE. The key is secure from unauthorizedaccess attempts as the HSM is a physical device and not an operating system file. Allencryption and decryption operations that use the master encryption key areperformed inside the HSM. This means that the master encryption key is neverexposed in insecure memory.

Question No: 39

Identify the two ways that Oracle Database Vault interacts with other Oracle security options and features.

  1. You can use Oracle Database Vault with Advanced Security.

  2. You can use Oracle Database Vault with Oracle Audit Vault.

  3. You cannot use Oracle Database Vault with a Virtual Private Database.

  4. You cannot use Oracle Database Vault with Oracle Label Security.

Answer: A,B Explanation:

Oracle Audit Vault can collect the audit data for OracleDatabase Vault. Transparent Data Encryption(part ofAdvanced Security) complements Oracle Database

Vault in that it provides data protection when the dataleaves the secure perimeter of the database.

Question No: 40

Your customer is trying to decide which type of Transparent Data Encryption (TDE) to use. They want to encrypt about 70% of the columns in a particular table, stored in a single tablespace. Which type of encryption would you recommend?

  1. Column-based encryption because it typically performs better

  2. Tablespace encryption because it typically performs better unless a very small portion of the table is to beencrypted

  3. Tablespace encryption because it typically performs better in all cases

  4. Column-based encryption if some of the encrypted data is large objects, table-based encryption if there areno large objects to be encrypted

Answer: B Explanation:

You can encrypt a new tablespace while you are creating it, but you cannot encrypt an existing tablespace. Asa workaround, you can use the CREATE TABLE AS SELECT, ALTER TABLE MOVE, or use Oracle DataPump import to get data from an existing tablespace into an encrypted tablespace.

100% Ensurepass Free Download!
Download Free Demo:1z0-528 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2018 EnsurePass 1z0-528 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No