多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can be used to control the time interval for which the access privilege is available to a user.DIt can be used to selectively restrict the access for each user in a database to different host computers.EIt can be used to selectively restrict a user's access to different applications in a specific host computer.

多选题
Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
A

It can be used to allow the access privilege settings for users but not roles.

B

It can be used to allow the access privilege settings for users as well as roles.

C

It can be used to control the time interval for which the access privilege is available to a user.

D

It can be used to selectively restrict the access for each user in a database to different host computers.

E

It can be used to selectively restrict a user's access to different applications in a specific host computer.


参考解析

解析: 暂无解析

相关考题:

Which three statements are true about the working of system privileges in a multitenant control database(CDB) that has pluggable databases (PDBs)?() A. System privileges apply only to the PDB in which they are used.B. Local users cannot use local system privileges on the schema of a common user.C. The granter of system privileges must possess the set container privilege.D. Common users connected to a PDB can exercise privileges across other PDBs.E. System privileges with the with grant option container all clause must be granted to a common user before the common user can grant privileges to other users.

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?() A. reflexiveB. extendedC. standardD. dynamic

Which two statements apply to dynamic access lists?() A.they offer simpler management in large internetworks.B.you can control logging messages.C.they allow packets to be filtered based on upper-layer session information.D.you can set a time-based security policy.E.they provide a level of security against spoofing.F.they are used to authenticate individual users.

Which two statements are true regarding the USING clause in table joins?()A、It can be used to join a maximum of three tables B、It can be used to restrict the number of columns used in a NATURAL join C、It can be used to access data from tables through equijoins as well as nonequijoins D、It can be used to join tables that have columns with the same name and compatible data types

Which two statements apply to dynamic access lists?()A、they offer simpler management in large internetworks.B、you can control logging messages.C、they allow packets to be filtered based on upper-layer session information.D、you can set a time-based security policy.E、they provide a level of security against spoofing.F、they are used to authenticate individual users

A member variable defined in a class can be accessed only by the classes in the same package. Which modifier should be used to obtain the access control?()         A、 privateB、 no modifierC、 publicD、 protected

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()A、reflexiveB、extendedC、standardD、dynamic

What is the maximum number of users that can be added to an autonomous access point that is being used as a local authenticator?()A、75B、100C、25D、50

What is the primary purpose of creating a Location Group Policy? ()A、to associate more than one realm with an authentication serverB、to logically group network access devices and associate them with specific sign-in policiesC、to allow or prevent users from accessing resources in specific locations on the networkD、to define the URL that users of network access devices can use to access the Infranet Controller

Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()A、It can be used to allow the access privilege settings for users but not roles.B、It can be used to allow the access privilege settings for users as well as roles.C、It can be used to control the time interval for which the access privilege is available to a user.D、It can be used to selectively restrict the access for each user in a database to different host computers.E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()A、It is a list of remote database links stored in the XML file that are available to the users of the database.B、It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.C、It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.D、It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

Which two statements accurately describe a role?()A、A role can be given to a maximum of 1000 users.B、A user can have access to a maximum of 10 roles.C、A role can have a maximum of 100 privileges contained in it.D、Privileges are given to a role by using the CREATE ROLE statement.E、A role is a named group of related privileges that can be granted to the user.F、A user can have access to several roles, and several users can be assigned the same role.

Which three statements are true about the working of system privileges in a multitenant control database(CDB) that has pluggable databases (PDBs)?()A、System privileges apply only to the PDB in which they are used.B、Local users cannot use local system privileges on the schema of a common user.C、The granter of system privileges must possess the set container privilege.D、Common users connected to a PDB can exercise privileges across other PDBs.E、System privileges with the with grant option container all clause must be granted to a common user before the common user can grant privileges to other users.

Which result or results do these actions produce?()A、Users in both departments can access their files from the network.B、Users in the accounting department can view the legal department’s documents.C、Users in the legal department cannot view the accounting department’s documents.D、Company managers can access and modify both departments’ files.

You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:  • Enable users in both departments to access their own files from the network  • Enable users in the Accounting department to view the Legal department’s documents  • Prevent users in the Legal department from being able to view the Accounting department’s    documents  • Enable managers within the company to access and modify both the Accounting and the Legal   department’s files You take the following actions:   • Create two shared folders named Accounting and Legal  • Create three groups named Accounting, Legal, and Management  • Allow the Accounting group Modify permission on the Accounting folder  • Allow the Accounting group Read permissions on the Legal folders.  • Allow the Management group Modify permission on both the Accounting and Legal folders.   Which result or results do these actions produce?()A、Users in both departments can access to their own files from the network.B、Users in the Accounting department can view the Legal department’s documents.C、Users in the Legal department cannot view the Accounting department’s documents.D、Company managers can access and modify both departments’ files.

多选题Which two statements are true regarding the USING clause in table joins?()AIt can be used to join a maximum of three tablesBIt can be used to restrict the number of columns used in a NATURAL joinCIt can be used to access data from tables through equijoins as well as nonequijoinsDIt can be used to join tables that have columns with the same name and compatible data types

单选题What is true about the operation of the Infranet Enforcer? ()AIt assigns users a set of roles.BIt allows access based on auth table entries.CIt verifies whether an endpoint meets security requirements.DIt configures the UAC agent to allow or deny access to resources.

多选题Which two statements regarding the FLASHBACK_TRANSACTION_QUERY view are correct?()AYou can find information about only active transactions from the viewBYou can find information about read only transactions from the viewCYou require the SELECT ANY TRANSACTION system privilege to access the viewDYou can find information about both active and committed transactions from the viewEYou require the SELECT ON FLASHBACK_TRANSACTION_QUERY object privilege to access the view

单选题You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()AIt is a list of remote database links stored in the XML file that are available to the users of the database.BIt is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.CIt is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.DIt is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

多选题Which two statements apply to dynamic access lists?()Athey offer simpler management in large internetworks.Byou can control logging messages.Cthey allow packets to be filtered based on upper-layer session information.Dyou can set a time-based security policy.Ethey provide a level of security against spoofing.Fthey are used to authenticate individual users

多选题Which two statements apply to dynamic access lists?()Athey offer simpler management in large internetworks.Byou can control logging messages.Cthey allow packets to be filtered based on upper-layer session information.Dyou can set a time-based security policy.Ethey provide a level of security against spoofing.Fthey are used to authenticate individual users.

多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can be used to control the time interval for which the access privilege is available to a user.DIt can be used to selectively restrict the access for each user in a database to different host computers.EIt can be used to selectively restrict a user's access to different applications in a specific host computer.

多选题Which two statements about voice VLANs are correct?()AVoice VLANs eliminate the need for QoS configurationBVoice VLANs are used on trunk links to eliminate the need for QoS CoS markingsCVoice VLANs are mainly used to reduce the number of access switch ports that are used in the networkDVoice VLANs can be configured to forward existing CoS priorities or override themEVoice VLANs are mainly used between access layer switches and distribution layer switchesFVoice VLANs can be configured on Layer 2 ports only

多选题Which two statements accurately describe a role?()AA role can be given to a maximum of 1000 users.BA user can have access to a maximum of 10 roles.CA role can have a maximum of 100 privileges contained in it.DPrivileges are given to a role by using the CREATE ROLE statement.EA role is a named group of related privileges that can be granted to the user.FA user can have access to several roles, and several users can be assigned the same role.

多选题Which three statements are true about the working of system privileges in a multitenant control database(CDB) that has pluggable databases (PDBs)?()ASystem privileges apply only to the PDB in which they are used.BLocal users cannot use local system privileges on the schema of a common user.CThe granter of system privileges must possess the set container privilege.DCommon users connected to a PDB can exercise privileges across other PDBs.ESystem privileges with the with grant option container all clause must be granted to a common user before the common user can grant privileges to other users.

多选题Which statements are true regarding the Query Result Cache?()AIt can be set at the system, session, or table level.BIt is used only across statements in the same session.CIt can store the results from normal as well as flashback queries.DIt can store the results of queries based on normal,temporary,and dictionary tables.

多选题Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()AIt can be used to block bulk encryption attacksBIt can be used to protect against denial of service attacksCTraffic originating from the router is considered trusted, so it is not inspectedDBased upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyETemporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

多选题Which two statements are true regarding Oracle Data Pump()AEXPDP and IMPDP are the client components of Oracle Data Pump.BDBMS_DATAPUMP PL/SQL packages can be used independently of the Data Pump clients.COracle Data Pump export and import operations can be performed only by users with the SYSDBA privilege.DOracle Data Pump imports can be done from the export files generated in the export utility of previous versions.EEXPDP and IMPDP use the procedures provided by DBMS_METADATA to execute export and import commands.