单选题Which of the following statements is used to prevent user TOM from adding and deleting data in table TAB1?()AREVOKE ADD, DELETE FROM USER tom ON TABLE tab1BREVOKE ADD, DELETE ON TABLE tab1 FROM USER tomCREVOKE INSERT, DELETE FROM USER tom ON TABLE tab1DREVOKE INSERT, DELETE ON TABLE tab1 FROM USER tom

单选题
Which of the following statements is used to prevent user TOM from adding and deleting data in table TAB1?()
A

REVOKE ADD, DELETE FROM USER tom ON TABLE tab1

B

REVOKE ADD, DELETE ON TABLE tab1 FROM USER tom

C

REVOKE INSERT, DELETE FROM USER tom ON TABLE tab1

D

REVOKE INSERT, DELETE ON TABLE tab1 FROM USER tom


参考解析

解析: 暂无解析

相关考题:

A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?() A.EDITB.CHMODC.ATTRIBD.CONVERT

Which of the following statements is used to grant user TOM and Application team APPGRP the ability to add data to table TAB1?() A.GRANT ADD DATA ON TABLE tab1 TO GROUP tom appgrpB.GRANT INSERT TO USER tom, GROUP appgrp ON TABLE tab1C.GRANT INSERT ON TABLE tab1 TO USER tom, GROUP appgrpD.GRANT ADD DATA ON TABLE tab1 TO USER appgrp, GROUP tom

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?() A.REVOKE ACCESS ON DATABASE FROM USER bobB.REVOKE CONNECT ON DATABASE FROM USER tomC.REVOKE tom FROM ACCESS ON DATABASE BY USER bobD.REVOKE tom FROM CONNECT ON DATABASE BY USER bob

Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?() A.REVOKE ALL PRIVILEGES FROM USER tomB.REVOKE ALL ON EMPLOYEE FROM USER tomC.REVOKE EXECUTE ON EMPLOYEE FROM USER tomD.REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom

The man page for command shows the following syntax: The man page for command shows the following syntax: command [ -a | -b ] Which of the following statements is true regarding this entry?() A. Either the -a or flag -b may be used, but not both.B. If the flag -a is used then the flag -b also must be used.C. One of the -a or -b flags must be used, but not both at the same time.D. Both the flags may be used together, but neither are mandatory.

The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?() A. The default administrative distance is used.B. The command is used to establish a static route.C. The command is used to configure the router interfaces.D. The command is used to establish a stub network.E. The subnet mask for the source address is 255.255.255.0

Which of the following statements is true regarding the VERSIONS BETWEEN clause?()  A、 The VERSIONS BETWEEN clause may be used in DML statements.B、 The VERSIONS BETWEEN clause may be used in DDL statements.C、 The VERSIONS BETWEEN clause may not be used to query past DDL changes to tables.D、 The VERSIONS BETWEEN clause may not be used to query past DML statements to tables.

The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?()A、The default administrative distance is used.B、The command is used to establish a static route.C、The command is used to configure the router interfaces.D、The command is used to establish a stub network.E、The subnet mask for the source address is 255.255.255.0

Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A、RIPB、0S:FC、STPD、EGP

A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()A、EDITB、CHMODC、ATTRIBD、CONVERT

Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()A、BIOS passwordB、Domain membershipC、EFSD、Bitlocker

Which of the following is the BEST way to prevent social engineering tactics?()A、End user trainingB、Antivirus softwareC、Group policyD、Encryption

Which of the following statements is used to prevent user TOM from adding and deleting data in table TAB1?()A、REVOKE ADD, DELETE FROM USER tom ON TABLE tab1B、REVOKE ADD, DELETE ON TABLE tab1 FROM USER tomC、REVOKE INSERT, DELETE FROM USER tom ON TABLE tab1D、REVOKE INSERT, DELETE ON TABLE tab1 FROM USER tom

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A、REVOKE ACCESS ON DATABASE FROM USER bobB、REVOKE CONNECT ON DATABASE FROM USER tomC、REVOKE tom FROM ACCESS ON DATABASE BY USER bobD、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()A、REVOKE ALL PRIVILEGES FROM USER tomB、REVOKE ALL ON EMPLOYEE FROM USER tomC、REVOKE EXECUTE ON EMPLOYEE FROM USER tomD、REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom

The man page for command shows the following syntax: The man page for command shows the following syntax: command [ -a | -b ] Which of the following statements is true regarding this entry?()A、Either the -a or flag -b may be used, but not both.B、If the flag -a is used then the flag -b also must be used.C、One of the -a or -b flags must be used, but not both at the same time.D、Both the flags may be used together, but neither are mandatory.

A user calls to report they are getting I/O errors on a file system. Which of the following tools should be used to isolate this problem?()A、dfB、diagrptC、errmsgD、errpt

Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()A、It can be used to allow the access privilege settings for users but not roles.B、It can be used to allow the access privilege settings for users as well as roles.C、It can be used to control the time interval for which the access privilege is available to a user.D、It can be used to selectively restrict the access for each user in a database to different host computers.E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

Which is the source used by Automatic SQL Tuning that runs as part of the AUTOTASK framework?()A、 SQL statements that are part of the AWR baseline onlyB、 SQL statements based on the AWR top SQL identificationC、 SQL statements that are part of the available SQL Tuning Set (STS) onlyD、 SQL statements that are available in the cursor cache and executed by a user other than SYS

多选题In your multitenant container database (CDB) containing same pluggable databases (PDBs), you execute the following commands in the root container: Which two statements are true?()AThe C # # ROLE1 role is created in the root database and all the PDBs.BThe C # # ROLE1 role is created only in the root database because the container clause is not used.CPrivileges are granted to the C##A_ADMIN user only in the root database.DPrivileges are granted to the C##A_ADMIN user in the root database and all PDBs.EThe statement for granting a role to a user fails because the CONTAINER clause is not used.

单选题Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()ARIPB0S:FCSTPDEGP

单选题A  user  wants  to  be  permanently  added  to  the  dba  group.  Which  of  the  following  commands  or processes can be used to accomplish this()AchgrpBchuserCedit /etc/userDedit /etc/security/group

单选题Which of the following groups is BEST to assign to a home user to prevent software installation?()AUsersBAdministratorsCPower UsersDRemote Desktop Users

单选题Which of the following statements is used to grant user TOM and Application team APPGRP the ability to add data to table TAB1?()AGRANT ADD DATA ON TABLE tab1 TO GROUP tom appgrpBGRANT INSERT TO USER tom, GROUP appgrp ON TABLE tab1CGRANT INSERT ON TABLE tab1 TO USER tom, GROUP appgrpDGRANT ADD DATA ON TABLE tab1 TO USER appgrp, GROUP tom

单选题Which is the source used by Automatic SQL Tuning that runs as part of the AUTOTASK framework?()A SQL statements that are part of the AWR baseline onlyB SQL statements based on the AWR top SQL identificationC SQL statements that are part of the available SQL Tuning Set (STS) onlyD SQL statements that are available in the cursor cache and executed by a user other than SYS

单选题Which of the following statements describes the functions of a reservoir used in a hydraulic system?()ADissipate heatBTrap foreign matterCSeparate air from the oilDAll of the above

单选题Which of the following statements is true regarding the VERSIONS BETWEEN clause?()A The VERSIONS BETWEEN clause may be used in DML statements.B The VERSIONS BETWEEN clause may be used in DDL statements.C The VERSIONS BETWEEN clause may not be used to query past DDL changes to tables.D The VERSIONS BETWEEN clause may not be used to query past DML statements to tables.

多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can be used to control the time interval for which the access privilege is available to a user.DIt can be used to selectively restrict the access for each user in a database to different host computers.EIt can be used to selectively restrict a user's access to different applications in a specific host computer.