Feature of the oracle autonomous database to protect data from external and internal threats?
TAKE THE TEST Show Title of test: Description: Author: Creation Date: Category: Number of questions: 149 No comments about this test. Content: What are two advantages of using Data Pump to migrate your Oracle Databases to Autonomous Database? (Choose two.) Data Pump can exclude migration of objects like indexes and materialized views that are not needed by Autonomous Database Data Pump is platform independent - it can
migrate Oracle Databases running on any platform Data Pump is faster to migrate database than using RMAN Data Pump creates the tablespaces used by your Autonomous Database. What are two security features enabled by default by the autonomous database?Encryption. Transparent Data Encryption (TDE) TDE enables you to encrypt data on storage media. ... . Backup Encryption. Backups are taken automatically. ... . SQL*Net Encryption. ... . Access Control List (ACL) ... . Private Endpoints. ... . Network Security Groups (NSGs) ... . Database Vault. ... . High Privileges Restrictions.. What are the security features of Oracle?Security Capabilities. Advanced Security - including Transparent Data Encryption.. Key Vault - Key Management for TDE.. Database Auditing.. Audit Vault and Database Firewall.. Database Security Assessment Tool.. Database Vault - Privileged User Controls.. Label Security - Mandatory Access Control.. Which two features are available in the enterprise edition of Oracle autonomous database?Key Features of Autonomous Database. Automated index management.. Automatic real-time statistics gathering.. Optimized high-frequency single-row inserts for applications.. preconfigured resource profiles for different types of users to achieve optimized query performance and concurrent workloads.. What are the 3 key capabilities of the autonomous database?Automatic encryption for the entire database, backups and all network connections. No access to OS or admin privileges prevents phishing attacks. Protects the system from both cloud operations and any malicious internal users.
|