The Oracle Security Challenge
Let's find out what how much you really know about Oracle security.
![]() |
|
![]() |
![]() |
![]() |
Do you know Oracle security?
Mr. Know-IT-All is back and he wants to know how much you really know about Oracle security. So, if you've got the guts, take his new Oracle Security Quiz and be sure to let us know know how well you did. And if you have ideas for future quizzes, we'd like to hear them too.
TABLE OF CONTENTS
Question 1: Blogger exposes Oracle weakness
Question 2: Flaws, flaws and more flaws
Question 3: Disk-to-tape on the fly
Question 4: Restricting data specifically
Question 5: Extra security for those in need
Question 1: Blogger exposes Oracle weakness
Independent Oracle security researcher and blogger Pete Finnegan has released a white paper warning Oracle users about a potential weakness in Oracle's Structured Query Language (PL/SQL). Where specifically did Finnegan say weakness exists?
B) Around the Procedural Language extension to PL/SQL
C) In the abstract data type called Descriptive Immediate Attributed Notation for ADA
D) In the coding techniques that developers use when working with Java
[ Click here to see the answer. ]
Question 2: Flaws, flaws and more flaws
Oracle's July 2006 quarterly Critical Patch Update (CPU) addressed a number of security holes affecting a variety of products, including the vendor's database and application server software. How many flaws did Oracle address in that CPU?
B) 82
C) 65
D) none
[ Click here to see the answer. ]
Question 3: Disk-to-tape on the fly
Oracle released new software designed to automate and encrypt disk-to-tape backups during April's Collaborate '06 conference in Nashville, Tenn. What is that software called?
B) Oracle Database Vault
C) Oracle Tape Security Vault
D) Oracle Safe Backup
[ Click here to see the answer. ]
Question 4: Restricting data specifically
Introduced in Oracle 8i, this Oracle technology restricts access to certain data to certain users. Specifically, it's used when the standard object privileges and associated database roles are insufficient to meet application security requirements, according to Oracle. What is this technology called?
B) Oracle Application Context
C) Oracle Virtual Private Database
D) Oracle Label Security
[ Click here to see the answer ]
Question 5: Extra security for those in need
According to Oracle, this optional Oracle DBMS add-on bundles network encryption and authentication solutions, single sign-on services and security protocols. What is this security package called?
B) Oracle Advanced Security
C) Oracle Advanced Networking
D) Oracle Advanced Encryption
[ Click here to see the answer. ]