You must rekey encrypted sensitive credential data In your database. You run the command alter database dictionary rekey credentials. Which three options ate true about the bkkey process?
A.
Credential Data Is automatically encrypted using aes2S6.
B.
The credential data encryption process does not de-obfuscate the obfuscated passwords before re-encrypts begin.
C.
Both sys. links and sys . SCHEDULER_CREDENTIAL tables are rekeyed.
D.
The rekey process prompts the user to provide a new key algorithm If needed.
E.
The process of rekeylng does not automatically open the keystore.
F.
The rekey process only applies to the sys.ltnks CREDENTUIALS table.
G.
The rekey process only applies to the SYS.SCHEDULES$ credential table.
Answer:
BFG
User Votes:
A 2 votes
50%
B 1 votes
50%
C 2 votes
50%
D
50%
E 2 votes
50%
F 1 votes
50%
G 1 votes
50%
Discussions
0/ 1000
econdeal
9 months, 2 weeks ago
A. You can manually encrypt the data that is stored in the SYS.LINK$ and SYS.SCHEDULER$_CREDENTIAL tables by using the ALTER DATABASE DICTIONARY statement. Though this feature makes use of Transparent Data Encryption (TDE), you do not need to have an Advanced Security Option license to perform the encryption, but you must have the SYSKM administrative privilege. TDE performs the encryption by using the AES256 (Advanced Encryption Standard) algorithm. The encryption follows the same behavior as other data that is encrypted using TDE.
Not b. and c ok. The database must have an open keystore and an encryption key before you run the ALTER DATABASE DICTIONARY statement with the ENCRYPT CREDENTIALS clause to encrypt SYS.LINK$ and SYS.SCHEDULER$_CREDENTIAL. The credential data encryption process de-obfuscates the obfuscated passwords and then encrypts them. The encryption applies to any future password changes that users may make after you complete this proces
econdeal
9 months, 1 week ago
rpta e . it can be retrieved to perform a database operation without manual intervention. However, some keystore operations that require the keystore password cannot be performed when the auto-login keystore is open. The auto-login keystore must be closed and the password-protected keystore must be opened for the keystore operations that require a password.
Want to join our community?
Please log in or signup in order to use this feature
A. You can manually encrypt the data that is stored in the SYS.LINK$ and SYS.SCHEDULER$_CREDENTIAL tables by using the ALTER DATABASE DICTIONARY statement. Though this feature makes use of Transparent Data Encryption (TDE), you do not need to have an Advanced Security Option license to perform the encryption, but you must have the SYSKM administrative privilege. TDE performs the encryption by using the AES256 (Advanced Encryption Standard) algorithm. The encryption follows the same behavior as other data that is encrypted using TDE.
Not b. and c ok. The database must have an open keystore and an encryption key before you run the ALTER DATABASE DICTIONARY statement with the ENCRYPT CREDENTIALS clause to encrypt SYS.LINK$ and SYS.SCHEDULER$_CREDENTIAL. The credential data encryption process de-obfuscates the obfuscated passwords and then encrypts them. The encryption applies to any future password changes that users may make after you complete this proces
rpta e . it can be retrieved to perform a database operation without manual intervention. However, some keystore operations that require the keystore password cannot be performed when the auto-login keystore is open. The auto-login keystore must be closed and the password-protected keystore must be opened for the keystore operations that require a password.