0% found this document useful (0 votes)
43 views10 pages

Oracle: Question & Answers

Uploaded by

Mustafa Taha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views10 pages

Oracle: Question & Answers

Uploaded by

Mustafa Taha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Oracle

1Z0-770
Oracle APEX Cloud Developer Professional
QUESTION & ANSWERS

https://www.oracledumpsfree.com/1Z0-770-exam-dumps.html
QUESTION: 1

Which method is used to manage the state of an APEX application?

A. Page Process

B. PL/SQL Procedure

C. Global Application Item

D. Branching

Correct Answer: C

Explanation/Reference:

Option 1: Incorrect. A page process is used to execute a PL/SQL procedure or perform other actions before a page is rendered

or submitted. It is not used to manage the state of an application. Option 2: Incorrect. A PL/SQL procedure can be used to

manipulate data in the database, but it is not specifically used to manage the state of an APEX application. Option 3: Correct. A

Global Application Item can be used to store and manage the state of an APEX application. It can be accessed and modified

from any page or application process. Option 4: Incorrect. Branching is used to navigate between pages in an application, but it

does not directly manage the state of the application.

QUESTION: 2

Which two statements are true about creating and using an interactive report?

A. You can specify an Authorization Scheme at the column level.

B. You cannot include Form Page when creating an interactive report page using the Create Page
Wizard.

C. You cannot customize the Search Button Label.

D. You cannot restrict users from saving private reports by using the Authorization Scheme.

Correct Answer: A,C

https://www.oracledumpsfree.com/1Z0-770-exam-dumps.html
QUESTION: 3

Which of the following statements best describes how to use the APEX Listener to secure APEX web services
and RESTful services?

A. The APEX Listener does not provide a very effective way of securing APEX web services and RESTful
services.

B. The APEX Listener provides built-in support for HTTPS by default which is a very effective way of
securing web services and RESTful services.

C. The APEX Listener can provide a way of securing APEX web services and RESTful services by using SSL
or HTTPS, but we have to configure this support ourselves.

D. The APEX Listener is not the recommended way of securing APEX web services and RESTful services.
We should use Oracle HTTP Server instead.

Correct Answer: C

Explanation/Reference:

Option 1: This option is incorrect. The APEX Listener does provide a way of securing APEX web services and RESTful services.

Option 2: This option is incorrect. Although the APEX Listener provides built-in support for HTTPS by default, this is not the only

way to secure web services and RESTful services. Option 3: This option is correct. The APEX Listener can provide a way of

securing APEX web services and RESTful services by using SSL or HTTPS, but we have to configure this support ourselves.

Option 4: This option is incorrect. Although Oracle HTTP Server can also be used to secure APEX web services and RESTful

services, the APEX Listener is a valid alternative that provides similar security features.

https://www.oracledumpsfree.com/1Z0-770-exam-dumps.html
QUESTION: 4

In which scenarios would you use the LOW_VALUE and HIGH_VALUE datatypes in an Oracle APEX application?

A. To store and manipulate large amounts of data efficiently.

B. To define the range of values for a column in a table.

C. To enforce data integrity constraints.

D. To optimize queries by using indexing.

Correct Answer: B

Explanation/Reference:

Option 1: Incorrect. The LOW_VALUE and HIGH_VALUE datatypes are not used to store and manipulate large amounts of data

efficiently. They are used to define the range of values for a column in a table. Option 2: Correct. The LOW_VALUE and

HIGH_VALUE datatypes are used to define the range of values for a column in a table. They can be used to enforce data

integrity constraints, such as ensuring that a column's value falls within a specific range. Option 3: Incorrect. The LOW_VALUE

and HIGH_VALUE datatypes are not used to enforce data integrity constraints. They are used to define the range of values for a

column in a table. Option 4: Incorrect. The LOW_VALUE and HIGH_VALUE datatypes are not used to optimize queries by using

indexing. They are used to define the range of values for a column in a table.

https://www.oracledumpsfree.com/1Z0-770-exam-dumps.html
QUESTION: 5

Which of the following methods is best for securing data in an Oracle APEX application?

A. Using a custom encryption algorithm

B. Storing data in plain text format

C. Using Oracle APEX built-in encryption functions

D. Storing data in a separate database with restricted access

Correct Answer: C

Explanation/Reference:

Option 1: Incorrect. Using a custom encryption algorithm can introduce security vulnerabilities and is not recommended. It is

better to use built-in encryption functions provided by Oracle APEX, as they have been tested and proven to be secure. Option

2: Incorrect. Storing data in plain text format is highly insecure and easily accessible by anyone with access to the database.

Encrypting the data is essential to protect sensitive information. Option 3: Correct. Oracle APEX provides built-in encryption

functions that can be used to secure data in an application. These functions ensure that data is encrypted at rest and in transit,

providing an extra layer of security. Option 4: Incorrect. Storing data in a separate database with restricted access can be a

good practice, but it is not the best method for securing the data within an Oracle APEX application. By using the built-in

encryption functions, data can be encrypted directly within the application.

https://www.oracledumpsfree.com/1Z0-770-exam-dumps.html
QUESTION: 6

What is the recommended way to integrate social sign-in with APEX applications?

A. Use the APEX Authentication feature to handle social sign-in.

B. Write custom code to integrate with each social network's API individually.

C. Use the Oracle Social Sign-In service to handle social sign-in.

D. Install and use a third-party plugin to handle social sign-in.

Correct Answer: C

Explanation/Reference:

Option 1: Incorrect. While the APEX Authentication feature can be used for social sign-in, the recommended approach is to use

the Oracle Social Sign-In service. Option 2: Incorrect. While it is possible to write custom code to integrate with each social

network's API individually, the recommended approach is to use the Oracle Social Sign-In service. Option 3: Correct. The

recommended approach to integrate social sign-in with APEX applications is to use the Oracle Social Sign-In service. This

service provides a simple integration point for various social network providers such as Facebook, Google, LinkedIn, and others

without having to write custom code. Option 4: Incorrect. While there are third-party plugins available for integrating social

sign-in with APEX applications, the recommended approach is to use the Oracle Social Sign-In service.

https://www.oracledumpsfree.com/1Z0-770-exam-dumps.html
QUESTION: 7

Which of the following is a best practice for implementing security in Oracle APEX applications?

A. Use a single username/password for all users

B. Store sensitive data in plain text

C. Implement authentication and authorization

D. Share user accounts among multiple applications

Correct Answer: C

Explanation/Reference:

Option 1: Incorrect. Using a single username/password for all users is not a best practice and can lead to security

vulnerabilities. Each user should have their own unique credentials. Option 2: Incorrect. Storing sensitive data in plain text is a

major security risk. It is recommended to store sensitive data securely, such as using encryption or hash algorithms. Option 3:

Correct. Implementing authentication and authorization is a best practice for implementing security in Oracle APEX

applications. Authentication verifies the identity of users, while authorization controls access to various resources based on a

user's privileges. Option 4: Incorrect. Sharing user accounts among multiple applications can lead to confusion and security

issues. It is recommended to have separate user accounts for each application.

https://www.oracledumpsfree.com/1Z0-770-exam-dumps.html
QUESTION: 8

In Oracle APEX, which of the following correctly describes how to implement VPD (Virtual Private Database)
policies for restricting data access?

A. Implement VPD policies at the application level using APEX_SHARED_SESSION package.

B. Implement VPD policies at the schema level using APEX_AUTHENTICATION package.

C. Implement VPD policies at the table level using DBMS_RLS package.

D. Implement VPD policies at the page level using APEX_PAGE package.

Correct Answer: C

Explanation/Reference:

Option 1: This option is incorrect because the APEX_SHARED_SESSION package is used to share session state between multiple

APEX applications. Option 2: This option is incorrect because the APEX_AUTHENTICATION package is used for managing

authentication in an APEX application. Option 3: This option is correct because the DBMS_RLS (Row Level Security) package

provides the capability to implement security policies on tables and views to control user access at the row level. Option 4: This

option is incorrect because the APEX_PAGE package is used for managing page processing and components at the page level.

https://www.oracledumpsfree.com/1Z0-770-exam-dumps.html
QUESTION: 9

Which component in SQL Workshop allows you to build queries graphically without manual SQLcoding?

A. Quick SQL

B. Query Builder

C. SQL commands

D. Data Workshop

Correct Answer: B

Explanation/Reference:

Query Builder is a component in SQL Workshop that allows you to build queries graphically without manual SQL coding. You

can use Query Builder to select tables and views from your schema, join them using drag-and-drop operations, add filters

andgroupings, and view the results in a grid or chart format. You can also switch to the SQL mode to view or edit the generated

SQL statement. The other options are incorrect because: Quick SQL is a component in SQL Workshop that allows you to

generate SQL scripts for creating tables and other database objects using shorthand syntax. You cannot use Quick SQL to build

queries graphically. SQL Commands is a component in SQL Workshop that allows you to run individual SQL statements or

PL/SQL blocks interactively. You cannot use SQL Commands to build queries graphically. Data Workshop is a component in SQL

Workshop that allows you to load or unload data from the database using various file formats. You cannot use Data Workshop

to build queries graphically. Verified References: [About Query Builder] [Using Query Builder]

https://www.oracledumpsfree.com/1Z0-770-exam-dumps.html
QUESTION: 10

Which feature of Oracle APEX allows developers to build web-based applications?

A. Use of HTML, CSS, and JavaScript

B. Integration with Oracle Database

C. Built-in user authentication and authorization

D. Responsive design templates

Correct Answer: A

Explanation/Reference:

Option 1: Correct. Oracle APEX allows developers to build web-based applications by providing integration with Oracle

Database. Developers can create interactive applications using SQL, PL/SQL, and Oracle APEX components. Option 2: Incorrect.

Although HTML, CSS, and JavaScript are used in Oracle APEX, they alone do not provide the full capability to build web-based

applications. The integration with Oracle Database is the key feature that enables developers to build applications. Option 3:

Incorrect. Built-in user authentication and authorization are important features of Oracle APEX, but they are not the primary

feature that allows developers to build web-based applications. Option 4: Incorrect. Responsive design templates are provided

by Oracle APEX to enable developers to create applications that can adapt to different screen sizes and devices. However, this

feature alone does not allow developers to build web-based applications.

https://www.oracledumpsfree.com/1Z0-770-exam-dumps.html

You might also like