Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

1z0-116 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

1z0-116 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Oracle Database Security Administration
  • Last Update: Sep 12, 2025
  • Questions and Answers: 90
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

1z0-116 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

1z0-116 Practice Exam Questions with Answers Oracle Database Security Administration Certification

Question # 6

You must disable OS authentication for database administrative users on a RAC database.

Which option must you use to do this?

A.

Set sqlnet.aothentication_sebvices=(NONe» In sqlnet.ora on the database server.

B.

Remove all OS users from OS groups: osdba, osoper, osbackupdba, osdgdba, osrmdba, OSASMADMIN, OSASMDBA.

C.

Set REMOTE_LOGIH_PASSWORDFILE = EXCLUSIVE In the init.ora file.

D.

Set REMOTE_OS_AUTHENT = FALSE In the init.ora file.

Full Access
Question # 7

You are Implementing a security policy that makes use of the USERENV namespace.

Which USERRENV value does not change for the duration of a session?

A.

SESSION_CSER

B.

CURRENT_OSER

C.

CURRENT SCHEMA

D.

CLIENT_INFO

Full Access
Question # 8

Which two represent the set of users that are never affected by connect command rules?

A.

SYS

B.

users with the DV_ACCTMGR role

C.

users with the DV_OWNER role

D.

users with the DV_ADMIN role

E.

SYSTEM

Full Access
Question # 9

Examine this command that Is executed:

1z0-116 question answer

What is the result?

A.

The salary column is fine grain audited.

B.

The salary column is nullified when queried by the database users.

C.

The bind variables for the salary column are masked In trace files and vS views.

D.

The salary column is encrypted using TDE column encryption.

E.

The salary column is redacted when queried by database users.

Full Access
Question # 10

Which three are true concerning command rules?

A.

System privileges override command rules.

B.

If a command rule's associated rule set evaluation results In an error, the command is not allowed to execute.

C.

A command can have only one command rule that applies to it.

D.

For DML statement command rules, you can specify a wildcard for the object owner.

E.

If a command rule's associated rule set Is disabled, then the rule set evaluates to true.

F.

For DML statement command rules, you can specify a wildcard for the object name.

G.

Object privileges override command rules.

Full Access
Question # 11

Examine this parameter In sqinet.ora:

SQLNET.ADTHENTICATION_SEBVICES=(NONE)

For which two cases do you need a password file?

A.

to authenticate externally Identified users locally

B.

to authenticate nonprivllegcd database users locally

C.

to authenticate administrative privileged users remotely

D.

to authenticate externally Identified users remotely

E.

to authenticate nonprivileged database users remotely

F.

to authenticate administrative privileged users locally

Full Access
Question # 12

Which two statements are true about Valid Node Checking for Registration (VNCR)?

A.

It denies Instance registration through IPC.

B.

It can only be used with Oracle RAC.

C.

It enforces the Listener connectivity through TCPS.

D.

It is a replacement for Class of Secure Transport (COST).

E.

It restricts specific instances from registering with the Listener.

Full Access
Question # 13

You configured Kerberos authentication for databases running on servers A and B.

However a database link connecting the database on server A to the database on server B fails with ORA-12638 Credential retrieval failed.

Where must you make a change to sqlnet.ora to allow the database link to use its stored credentials Instead of trying to use Kerberos?

A.

on client side of server B

B.

on client side of server A

C.

on server side of server B

D.

on server side of server A

Full Access
Question # 14

Examine this sqlnet.ora file used by a client application:

1z0-116 question answer

Which three are found in the wallet specified by the directory parameter?

A.

the private key of the database service

B.

the trusted certificates of the database service

C.

the user certificate used to uniquely Identify the database service

D.

the private key of the client application

E.

the username, password, and service name required to connect to the database

F.

the user certificate used to uniquely Identify the client application

G.

the trusted certificates of the Certification Authority

Full Access
Question # 15

Which CVSS Version 3.1 metric indicates how close an attacker needs to be to the vulnerable component?

A.

Privileges Required

B.

User Interaction

C.

Attack Vector

D.

Scope

E.

Availability

F.

Attack Complexity

Full Access
Question # 16

Examine this security parameter and Its value:

SEC_USER_ONAUTHORIZED_ACCESS_BANNER=/opt/oracla/admin/data/unauthwarninq.txt In which file must you include this parameter?

A.

init. era

B.

listener.ora

C.

aqlnet.ora

D.

tnsnaroes.ora

E.

names.ora

F.

server.xml

Full Access
Question # 17

Examine the statement:

CREATE BOLE hr_admin IDENTIFIED USING pac_mgr.hr_admin_rola_ch9ck;

Which three are true about the sec_mgr. hr_admin_role_check procedure?

A.

It must use only one security check to validate the user.

B.

It must use the invokcr's rights to enable the role,

C.

It must use the deflner's rights to enable the role.

D.

It can Include one or more security checks to validate the user.

E.

It must contain a SET ROLE statement or a DBMS_SESSION.SET_ROLE call.

F.

It can use only the DBMS_SESSION. SET_ROLE procedure.

G.

Its owner SEC_MGR must be granted the execute any procedure role.

Full Access
Question # 18

Which statement is true about Network ACLs?

A.

They ate used to control access by users to external network services and resources from the database through PL/SQL.

B.

They are used to provide access to database packages.

C.

They are used to control the usage of UTL_TCP, ITL_HTTP, and UTL_INADDR.

D.

They are used to configure proxy for PL/SQL network utility packages.

Full Access
Question # 19

What is true about the client identifier?

A.

The client Identifier is automatically included In the audit trail.

B.

The client Identifier is automatically set by the SQL-Net layer.

C.

A session can have multiple client Identifier values set simultaneously.

D.

The client Identifier cannot be changed during the session.

Full Access
Question # 20

Which two statements are true about column-level transparent data encryption?

A.

It can bo used for tables in encrypted tablcspaces.

B.

encrypted columns cannot have an Index.

C.

All encrypted columns of a table use the same encryption key.

D.

Column level encrypted data remains encrypted in the buffer cache.

E.

Column-level encryption keys are not encrypted by the master key.

Full Access
Question # 21

You are required to remove embedded passwords from scripts that connect to database instances. Which tool can be used to implement this requirement?

A.

orapki

B.

netca

C.

dbca

D.

netmgr

E.

mkstore

F.

owm

Full Access
Question # 22

When querying the database view, VSECRYPTION_WALLET, the status Is OPEN_NO_MASTER _KEY. What does this mean?

A.

You do not have select privileges on this database view.

B.

The master key has been corrupted.

C.

The key store is not open.

D.

The master key has not been created.

E.

This is expected behavior for this view.

Full Access
Question # 23

A DBA user created and configured this secure application role:

1z0-116 question answer

Why does the error occur?

A.

User psmith Is connecting outside of the SYSDATE specified.

B.

The set hole hr_admin stuternent must be executed with the dbms. session. set_role procedure.

C.

user psmith is connecting remotely.

D.

The HR_ADMIN role must be granted to user PSMITH.

E.

The HR.ROLE_CHECK procedure must be created with the AUTHID CURRENT_USERR clause.

F.

The HR.ROLE_CHECK procedure must be created without the AUTHID clause.

Full Access
Question # 24

An audit administrator wants to log Client Context variables In the audit trail.

Examine this query and the output:

1z0-116 question answer

A.

AUDIT CONTEXT NAMESPACE hr_Ct:x ATTRIBUTES hr_app_id NAMESPACE USERENV ATTRIBUTES ALL BY hr;

B.

AUDIT CONTEXT NAMESPACE hr_ctx ATTRIBUTES hr_app_id NAMESPACE USERENV ATTRIBUTES

current:_user( db_name BY hr;

C.

CREATE AUDIT POLICY hr_omp_pol ACTIONS UPDATE ON hr.employoes;

D.

AUDIT CONTEXT NAMESPACE hr_ctx ATTRIBUTES hr_app_id, current_user, db_name BY hr

E.

AUDIT POLICY hr_emp_pol BY hr;

F.

CREATE AUDIT POLICY hr_emp_pol ACTIONS SELECT ON hr. employees;

G.

AUDIT POLICY hr_emp_pol EXCEPT hr;

Full Access
Question # 25

Which two are true about Database Privilege Analysis?

A.

It can be used after you install the Oracle Database without any additional database configuration steps.

B.

It must have the Database Vault option enabled.

C.

Privilege analysis data for dropped objects are kept.

D.

If a privilege is captured during run time, it is saved under the run-time capture name.

E.

It shows the grant paths to the privileges and suggests which grant path to keep.

F.

It cannot be used to capture the privileges that have been exercised on precompiled database objects.

Full Access
Question # 26

A database link must be created to connect a source Autonomous Database to target on premises database.

Examine this command:

1z0-116 question answer

Which two options are true?

A.

The target database wallet can be uploaded to the data_pctmp_dtr directory.

B.

The db_link_cred parameter stores the password in a wallet.

C.

The db__link__cred references the credential for the username and password for the target database.

D.

The credential_nam£ parameter automatically creates the credential object store.

E.

The database link port Is not correct because It must be restricted to 1521.

F.

Only data_pump_dir directory can be used to store credential wallets.

Full Access
Question # 27

You export and Import a table's data using Data Pump connected as a user who Is assigned DBA role with default privileges.

There is a data redaction policy on the table.

Which two statements are true about the redaction policy?

A.

The actual data in the tables is copied to the Data Pump target system with the redaction policy applied.

B.

The policy Is not Included In export and Import operation.

C.

The actual data in the tables is copied to the Data Pump target system without being redacted.

D.

The policy Is Included In the export and Import operation but is not applied by default to the objects In the target system.

E.

The policy is included in the export and import operation and applied by default to the objects in the target system.

Full Access