| Qno | Answer (Option with the text) |
|---|---|
| 1 | a) CREATE USER |
| 2 | b) IDENTIFIED BY |
| 3 | c) ALTER USER |
| 4 | b) USERS |
| 5 | c) CREATE USER |
| 6 | b) To assign privileges to users |
| 7 | a) CREATE ROLE |
| 8 | a) GRANT |
| 9 | b) SYSDBA |
| 10 | b) GRANT ANY ROLE |
| 11 | a) Object privilege |
| 12 | b) SELECT |
| 13 | c) To perform specific database operations |
| 14 | a) CREATE TABLE |
| 15 | b) REVOKE |
| 16 | a) AUDIT |
| 17 | a) Oracle Audit Trail |
| 18 | b) Use complex passwords and change them regularly |
| 19 | b) To log all database transactions and activities |
| 20 | c) Implement role-based access control |
| 21 | b) To enforce security policies and data access control |
| 22 | a) Policy function |
| 23 | a) Fine-grained access control |
| 24 | b) VPD restricts user access to specific rows in a table |
| 25 | a) DBMS_RLS.ADD_POLICY |
| 26 | b) To add and manage VPD policies |
| 27 | b) It generates the SQL query based on the user’s access |
| 28 | c) It provides row-level security based on the user context |
| 29 | b) VPD enables dynamic, user-specific query restrictions |
| 30 | a) Fine-grained access control |