Question 1

Which two configurations can be used to protect sensitive data In a database?
  • Question 2

    Database Vault is not used in your installation.
    Why is a conventional secure application role more secure than a normal role?
  • Question 3

    You Issue this statement as user SYS:
    audit, context namespace kilimanjaro attributes a, b;
    Which is true?
  • Question 4

    Data Masking uses a combination of data patterns to discover sensitive dat a. Which three items are used?
  • Question 5

    Which CVSS Version 3.1 metric indicates how close an attacker needs to be to the vulnerable component?