Data encryption and decryption occurs at which layer of the OSI model?()
A、Transport
B、Presentation
C、Session
D、Application
A、Transport
B、Presentation
C、Session
D、Application
A、The data is decrypted during SORT and JOIN operations. B、The data remains encrypted when it is read into memory. C、The data remains encrypted when it is stored in the redo logs. D、The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.
A、Use Data Pump to transfer the existing data to a new encrypted tablespace B、Use ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespace C、Use CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespace D、Enable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespace E、Encrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted
A、 The data is decrypted during SORT and JOIN operations. B、 The data remains encrypted when it is read into memory. C、 The data remains encrypted when it is stored in the redo logs. D、 The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.
A、They use the same key for encryption and decryption of data. B、They use different keys for decryption but the same key for encryption of data. C、They use different keys for encryption and decryption of data. D、They use the same key for decryption but different keys for encryption of data.
A、The same key is used for encryption and decryption. B、It is commonly used to create digital certificate signatures. C、It uses two keys: one for encryption and a different key for decryption. D、An attacker can decrypt data if the attacker captures the key used for encryption.
A、The same key is used for encryption and decryption. B、It is commonly used to create digital certificate signatures. C、It uses two keys: one for encryption and a different key for decryption. D、An attacker can decrypt data if the attacker captures the key used for encryption.
A、An error will occur. B、Data passed between the client and the server is encrypted. C、User IDs and passwords are passed to the server unencrypted. D、User IDs and passwords are encrypted before they are passed to the server.
A、A. It creates the table and encrypts the data in it. B、B. It generates an error because the wallet is closed. C、C. It creates the table but does not encrypt the data in it. D、D. It generates an error because the NO SALT option cannot be used with the ENCRYPT option.
A、The amount of undo retained is user controlled. B、SecureFile LOBs can be used only for nonpartitioned tables. C、Fragmentation is minimized by using variable-sized chunks dynamically. D、SecureFile encryption allows for random reads and writes of the encrypted data. E、It automatically detects duplicate LOB data and conserves space by storing only one copy.