多选题Which two statements accurately describe a role?()AA role can be given to a maximum of 1000 users.BA user can have access to a maximum of 10 roles.CA role can have a maximum of 100 privileges contained in it.DPrivileges are given to a role by using the CREATE ROLE statement.EA role is a named group of related privileges that can be granted to the user.FA user can have access to several roles, and several users can be assigned the same role.
多选题
Which two statements accurately describe a role?()
A
A role can be given to a maximum of 1000 users.
B
A user can have access to a maximum of 10 roles.
C
A role can have a maximum of 100 privileges contained in it.
D
Privileges are given to a role by using the CREATE ROLE statement.
E
A role is a named group of related privileges that can be granted to the user.
F
A user can have access to several roles, and several users can be assigned the same role.
参考解析
解析:
暂无解析
相关考题:
In your multitenant container database (CDB) containing same pluggable databases (PDBs), you execute the following commands in the root container:Which two statements are true?() A. The C # # ROLE1 role is created in the root database and all the PDBs.B. The C # # ROLE1 role is created only in the root database because the container clause is not used.C. Privileges are granted to the C##A_ADMIN user only in the root database.D. Privileges are granted to the C##A_ADMIN user in the root database and all PDBs.E. The statement for granting a role to a user fails because the CONTAINER clause is not used.
On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()A. Sign-in PolicyB. Role Mapping RuleC. Role RestrictionsD. Trusted Server CA
A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page.Based on the merging of these two roles, which two will be applied?()A. A custom logo on the user interface pageB. A maximum timeout value of 600 minutesC. A maximum time out value of 1200 minutesD. A default Juniper Networks logo on the user interface page
Which two statements are true regarding the USING clause in table joins?()A、It can be used to join a maximum of three tables B、It can be used to restrict the number of columns used in a NATURAL join C、It can be used to access data from tables through equijoins as well as nonequijoins D、It can be used to join tables that have columns with the same name and compatible data types
A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()A、A custom logo on the user interface pageB、A maximum timeout value of 600 minutesC、A maximum time out value of 1200 minutesD、A default Juniper Networks logo on the user interface page
You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()A、The user cannot use the role at all.B、The role would not be granted to the user.C、The user needs to enable the role explicitly.D、The user can start using the role immediately.E、The user would have the admin option for the role.
Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()A、Every tag must have at least one tag.B、A tag can have many tags.C、A given tag can apply to only one tag.D、A given tag can contain from zero to many tags.E、It is possible to construct a valid tag such that,for a given resource,no user rolescan access that resource.
On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()A、Sign-in PolicyB、Role Mapping RuleC、Role RestrictionsD、Trusted Server CA
Given the two security constraints in a deployment descriptor: 101. 102. 103.SALES 104.SALES 105. 106. 107. 108. 109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()A、auth-constraint/B、auth-constraintrole-name*/role-name/auth-constraintC、auth-constraintrole-nameANY/role-name/auth-constraintD、auth-constraintrole-nameMARKETING/role-name/auth-constraint
Given: 3.class MyServlet extends HttpServlet { 4.public void doPut(HttpServletRequest req, HttpServletResponse resp) throws ServletException,IOException { 5.// servlet code here ... 26.} 27.} If the DD contains a single security constraint associated with MyServlet and its only tagsand tags are:GETPUT Admin Which four requests would be allowed by the container?()A、A user whose role is Admin can perform a PUT.B、A user whose role is Admin can perform a GET.C、A user whose role is Admin can perform a POST.D、A user whose role is Member can perform a PUT.E、A user whose role is Member can perform a POST.F、A user whose role is Member can perform a GET.
View the Exhibit to observe the roles assigned to the SL_REP user. Which statement is true about theassignment of the SELECT_CATALOG_ROLE role to the SL_REP user()A、The user must enable the role explicitly.B、The user can grant the role to other users.C、The user cannot use the role until the DBA enables it explicitly.D、The user can start using the role immediately without any changes
Which two statements accurately describe a role?()A、A role can be given to a maximum of 1000 users.B、A user can have access to a maximum of 10 roles.C、A role can have a maximum of 100 privileges contained in it.D、Privileges are given to a role by using the CREATE ROLE statement.E、A role is a named group of related privileges that can be granted to the user.F、A user can have access to several roles, and several users can be assigned the same role.
You have been asked to create three users, PUB1, PUB2 and PUB3, for three newly hired employees and to allocate unlimited quota on their default tablespace PUBLISHER_TBS with no other privileges. After creating the users, which method can you use for granting the required privileges?()A、grant CONNECT role to all of the three usersB、grant RESOURCE role to all of the three usersC、grant both CONNECT and RESOURCE role to all of the three usersD、execute ALTER USER .. QUOTA UNLIMITED ON publisher_tbs command for all of the three usersE、create role with UNLIMITED TABLESPACE system privilege and assign the role to all of the three users
Which two statements are true about the roles in the Oracle database?()A、A role can be granted to itself.B、Roles are owned by the SYS user.C、Roles can be granted to other roles.D、A role cannot be assigned external authentication.E、A role can contain both system and object privileges.
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB01 in the instance. The company CIO wants all the application developers can capture traces to troubleshoot the application that uses the database DB1, and they can perform this by using SQL Server Profiler. But they have to be given as little permission as possible. The company CIO assigns this task to you. So what action should you perform to achieve this goal?() A、All the SQL Server logins of the application developers have to be added to a fixed server role. B、All the database users of the application developers have to be added to a fixed database role C、All SQL Server logins of the application developers should be given the appropriate server-level permissions. D、All database users of the application developers should be given the appropriate database-level permissions.
多选题Which two statements are true regarding the USING clause in table joins?()AIt can be used to join a maximum of three tablesBIt can be used to restrict the number of columns used in a NATURAL joinCIt can be used to access data from tables through equijoins as well as nonequijoinsDIt can be used to join tables that have columns with the same name and compatible data types
多选题Given the two security constraints in a deployment descriptor: 101. 102. 103.SALES 104.SALES 105. 106. 107. 108. 109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()Aauth-constraint/Bauth-constraintrole-name*/role-name/auth-constraintCauth-constraintrole-nameANY/role-name/auth-constraintDauth-constraintrole-nameMARKETING/role-name/auth-constraint
多选题Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()AEvery tag must have at least one tag.BA tag can have many tags.CA given tag can apply to only one tag.DA given tag can contain from zero to many tags.EIt is possible to construct a valid tag such that,for a given resource,no user rolescan access that resource.
单选题View the Exhibit to observe the roles assigned to the SL_REP user. Which statement is true about theassignment of the SELECT_CATALOG_ROLE role to the SL_REP user()AThe user must enable the role explicitly.BThe user can grant the role to other users.CThe user cannot use the role until the DBA enables it explicitly.DThe user can start using the role immediately without any changes
多选题You execute the following piece of code with appropriate privileges: User SCOTT has been granted theCREATE SESSION privilege and the MGR role.Which two statements are true when a session logged in as SCOTT queries the SAL column in the viewand the table?()AData is redacted for the EMP.SAL column only if the SCOTT session does not have the MGR role set.BData is redacted for EMP.SAL column only if the SCOTT session has the MGR role set.CData is never redacted for the EMP_V.SAL column.DData is redacted for the EMP_V.SAL column only if the SCOTT session has the MGR role set.EData is redacted for the EMP_V.SAL column only if the SCOTT session does not have the MGR role set.
单选题You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()AThe user cannot use the role at all.BThe role would not be granted to the user.CThe user needs to enable the role explicitly.DThe user can start using the role immediately.EThe user would have the admin option for the role.
多选题Examine the code: CREATE ROLE readonly IDENTIFIES USING app.chk_readwrite ; CREATE ROLE readwrite IDENTIFIED USING app.chk_readwrite ; CREATE OR REPLACE PROCEDURE app.chk_readwrite AUTHID CURRENT_USER IS ipchk STRING(30); BEGIN IF sys_context(‘USERENV’,’ISDBA’)=’TRUE’ THEN DBMS_SESSION.SET_ROLE‘READWRITE’) ; ELSE DBMS_SESSION.SET_ROLE(‘READONLY’) ; END; / Which three statements correctly describe the Secure Application role definition?()ANo user or application has to remember or hide a password.BIt prevents everyone except a true DBA session from acquiring the READWRITE role.Capp.chk_readwrite is called whenever a user tries to access rows protected by the READONLY or READWRITE label.Dapp.chk_readwrite is called by users or applications when they want to enable the READONLY or READWRITE role.
多选题Given the two security constraints in a deployment descriptor: 101. 102. 103.SALES 104.SALES 105. 106. 107. 108. 109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()Aauth-constraint/Bauth-constraintrole-name*/role-name/auth-constraintCauth-constraintrole-nameANY/role-name/auth-constraintDauth-constraintrole-nameMARKETING/role-name/auth-constraint
单选题View the Exhibit and examine the privileges granted to the MGR_ROLE role. The user SKD has been grantedthe CONNECT and RESOURCE roles only. The database administrator (DBA) grants MGR_ROLE to the userSKD by executing the command: SQL GRANT MGR_ROLE TO SKD WITH ADMIN OPTION; Which statement is true about the user SKD afterhe/she is granted this role()A The user SKD can grant only the MGR_ROLE role to other users, but not the privileges in it.B The user SKD can revoke the MGR_ROLE only from the users for whom he/she is the grantor.C The user SKD can grant the privileges in the MGR_ROLE role to other users, but not with ADMIN OPTION.D The user SKD can grant the privileges in the MGR_ROLE role to other users, but cannot revoke privilegesfrom them
多选题Which two statements are true about the roles in the Oracle database?()AA role can be granted to itself.BRoles are owned by the SYS user.CRoles can be granted to other roles.DA role cannot be assigned external authentication.EA role can contain both system and object privileges.
多选题Which two statements accurately describe a role?()AA role can be given to a maximum of 1000 users.BA user can have access to a maximum of 10 roles.CA role can have a maximum of 100 privileges contained in it.DPrivileges are given to a role by using the CREATE ROLE statement.EA role is a named group of related privileges that can be granted to the user.FA user can have access to several roles, and several users can be assigned the same role.
多选题Given: 3.class MyServlet extends HttpServlet { 4.public void doPut(HttpServletRequest req, HttpServletResponse resp) throws ServletException,IOException { 5.// servlet code here ... 26.} 27.} If the DD contains a single security constraint associated with MyServlet and its only tagsand tags are:GETPUT Admin Which four requests would be allowed by the container?()AA user whose role is Admin can perform a PUT.BA user whose role is Admin can perform a GET.CA user whose role is Admin can perform a POST.DA user whose role is Member can perform a PUT.EA user whose role is Member can perform a POST.FA user whose role is Member can perform a GET.
多选题A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()AA custom logo on the user interface pageBA maximum timeout value of 600 minutesCA maximum time out value of 1200 minutesDA default Juniper Networks logo on the user interface page