The Oracle Security Challenge

Let's find out what how much you really know about Oracle security.

Mr. Know-IT-All
 

Do you know Oracle security?

Mr. Know-IT-All is back and he wants to know how much you really know about Oracle security. So, if you've got the guts, take his new Oracle Security Quiz and be sure to let us know know how well you did. And if you have ideas for future quizzes, we'd like to hear them too.




TABLE OF CONTENTS
   Question 1: Blogger exposes Oracle weakness
   Question 2: Flaws, flaws and more flaws
   Question 3: Disk-to-tape on the fly
   Question 4: Restricting data specifically
   Question 5: Extra security for those in need


 




 


  Question 1: Blogger exposes Oracle weakness

Independent Oracle security researcher and blogger Pete Finnegan has released a white paper warning Oracle users about a potential weakness in Oracle's Structured Query Language (PL/SQL). Where specifically did Finnegan say weakness exists?

A) In SQL itself
B) Around the Procedural Language extension to PL/SQL
C) In the abstract data type called Descriptive Immediate Attributed Notation for ADA
D) In the coding techniques that developers use when working with Java

[ Click here to see the answer. ]

 




 


  Question 2: Flaws, flaws and more flaws

Oracle's July 2006 quarterly Critical Patch Update (CPU) addressed a number of security holes affecting a variety of products, including the vendor's database and application server software. How many flaws did Oracle address in that CPU?

A) 36
B) 82
C) 65
D) none

[ Click here to see the answer. ]

 




 


  Question 3: Disk-to-tape on the fly

Oracle released new software designed to automate and encrypt disk-to-tape backups during April's Collaborate '06 conference in Nashville, Tenn. What is that software called?

A) Oracle Secure Backup
B) Oracle Database Vault
C) Oracle Tape Security Vault
D) Oracle Safe Backup

[ Click here to see the answer. ]

 




 


  Question 4: Restricting data specifically

Introduced in Oracle 8i, this Oracle technology restricts access to certain data to certain users. Specifically, it's used when the standard object privileges and associated database roles are insufficient to meet application security requirements, according to Oracle. What is this technology called?

A) Oracle Column Relevance
B) Oracle Application Context
C) Oracle Virtual Private Database
D) Oracle Label Security

[ Click here to see the answer ]

 




 


  Question 5: Extra security for those in need

According to Oracle, this optional Oracle DBMS add-on bundles network encryption and authentication solutions, single sign-on services and security protocols. What is this security package called?

A) Oracle Internet Directory
B) Oracle Advanced Security
C) Oracle Advanced Networking
D) Oracle Advanced Encryption

[ Click here to see the answer. ]

 




 


 

This Content Component encountered an error

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchDataManagement

SearchBusinessAnalytics

SearchSAP

SearchSQLServer

TheServerSide

SearchDataCenter

SearchContentManagement

SearchFinancialApplications

Close