oracle 1z0-116 practice test

Exam Title: Oracle Database Security Administration

Last update: Dec 07 ,2025
Question 1

Database Vault is not used in your installation.
Why is a conventional secure application role more secure than a normal role?

  • A. It Is In effect only when configured as a default role for the user.
  • B. It requires a password to be set.
  • C. It can be set only by a package or procedure that is created with deflner's rights.
  • D. It can be set only by users with the grant any bole privilege.
  • E. It can be set only by a package or procedure associated with the role definition.
Answer:

D


vote your answer:
A
B
C
D
E
A 0 B 0 C 1 D 0 E 3
Comments
Question 2

The listener configuration contains these lines related to Valid Node Checking for Registration
(VNCR);

Which two statements are true?

  • A. Both parameters cannot be set at the same time so will be Ignored.
  • B. Listener listener will allow instance registration from IP address 192.168.20.2.
  • C. Listener listener will allow Instance registration from REGISTRATION_INVITED_NODES_LISTENEP.
  • D. Listener listener will only deny instance registration from REGISTRATION EXCLUDED NODES LISTENER.
  • E. Listener listener will deny instance registration from IP address 192.168.20.2.
Answer:

C


vote your answer:
A
B
C
D
E
A 0 B 3 C 3 D 0 E 0
Comments
econdeal
1 year, 8 months ago

b anc c... Just as in validnode checking, both invited/excluded cannot be specified together. If they are, invited nodes take precedence.

Question 3

Which statement is true about Network ACLs?

  • A. They ate used to control access by users to external network services and resources from the database through PL/SQL.
  • B. They are used to provide access to database packages.
  • C. They are used to control the usage of UTL_TCP, ITL_HTTP, and UTL_INADDR.
  • D. They are used to configure proxy for PL/SQL network utility packages.
Answer:

D


Explanation:
TheNETWORK_ACL_ADMINpackage provides the interface to administer the network access control
lists (ACL). ACLs are used to control access by users to external network services and resources from
the
database
through
PL/SQL
network
utility
packages
including
UTL_TCP
,
UTL_HTTP
,
UTL_SMTP
and
UTL_INADDR
.
https://docs.oracle.com/database/121/ARPLS/d_networkacl_adm.htm#ARPLS74568

vote your answer:
A
B
C
D
A 3 B 0 C 0 D 0
Comments
Question 4

You must disable OS authentication for database administrative users on a RAC database.
Which option must you use to do this?

  • A. Set sqlnet.aothentication_sebvices=(NONe» In sqlnet.ora on the database server.
  • B. Remove all OS users from OS groups: osdba, osoper, osbackupdba, osdgdba, osrmdba, OSASMADMIN, OSASMDBA.
  • C. Set REMOTE_LOGIH_PASSWORDFILE = EXCLUSIVE In the init.ora file.
  • D. Set REMOTE_OS_AUTHENT = FALSE In the init.ora file.
Answer:

D


vote your answer:
A
B
C
D
A 3 B 0 C 0 D 1
Comments
seba1494
11 months, 1 week ago

By default users that are able to logon as the 'oracle' user on the unix/linux box are able to login to the database with administrator privileges via the command 'sqlplus / as sysdba'.

This form of authentication relies on the feature called 'Operating System Authentication' - No password is required for the user 'oracle'.

You may want to disable this authentication, and if any operating system user tries to login to the database instance, the user should be forced to use the command 'sqlplus sys@as sysdba' and supply the correct password. How would that be possible if at all?

Question 5

Which type of attack attempts to find data by repeatedly trying similar SQL with a modified
predicate?

  • A. timing attack
  • B. Inference attack
  • C. data remanence attack
  • D. cache attack
  • E. side-channel attack
  • F. known-plaintext attack
Answer:

D


vote your answer:
A
B
C
D
E
F
A 0 B 3 C 0 D 0 E 0 F 0
Comments
Question 6

Which two statements are true about Valid Node Checking for Registration (VNCR)?

  • A. It denies Instance registration through IPC.
  • B. It can only be used with Oracle RAC.
  • C. It enforces the Listener connectivity through TCPS.
  • D. It is a replacement for Class of Secure Transport (COST).
  • E. It restricts specific instances from registering with the Listener.
Answer:

AD


vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 3 E 3
Comments
Question 7

You are required to remove embedded passwords from scripts that connect to database instances.
Which tool can be used to implement this requirement?

  • A. orapki
  • B. netca
  • C. dbca
  • D. netmgr
  • E. mkstore
  • F. owm
Answer:

C


vote your answer:
A
B
C
D
E
F
A 0 B 0 C 0 D 0 E 3 F 1
Comments
Question 8

You grant user JANE the SYSDBA administrative privilege. Which two are true?

  • A. User JANE must always connect as SYSDBA to the database instance.
  • B. User JANE can grant SYSDBA privilege to roles.
  • C. User JANE must use operating system authentication.
  • D. User JANE can create objects In sys schema only when connected as SYSDBA.
  • E. User JANE acquires the DBA role by default.
  • F. User JANE can backup and recover the database.
Answer:

D


vote your answer:
A
B
C
D
E
F
A 0 B 1 C 0 D 2 E 0 F 2
Comments
Question 9

As an Autonomous Transaction Processing (ATP) database administrator, you want to extend the
storage capacity In the database.
Examine this command and output from the database:

What is the reason for the error?

  • A. The storage quota has been reached for the ATP database.
  • B. The create TABLESAPECE statement is not available in ATP.
  • C. There is not enough storage available in the ATP database.
  • D. You must be explicitly granted the create TABLESPACE privilege in ATP.
  • E. Database Vault prevents you from executing this command.
Answer:

C


vote your answer:
A
B
C
D
E
A 0 B 3 C 0 D 0 E 1
Comments
Question 10

Which two statements are true about Database Vault factors?

  • A. A factor can reference a function In another schema to compute its value, provided execute privilege Is granted to the sys user.
  • B. Changing a factor type can change how factors are evaluated.
  • C. You can configure a factor to be evaluated only once per session.
  • D. You get an error at the time of factor creation If the retrieval method function you have specified does not exist.
  • E. You can use a factor to enforce conditions for a command rule.
Answer:

AC


vote your answer:
A
B
C
D
E
A 1 B 2 C 2 D 1 E 1
Comments
Page 1 out of 8
Viewing questions 1-10 out of 90
Go To
page 2