OCP 11G认证考试

多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can

题目
多选题
Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
A

It can be used to allow the access privilege settings for users but not roles.

B

It can be used to allow the access privilege settings for users as well as roles.

C

It can be used to control the time interval for which the access privilege is available to a user.

D

It can be used to selectively restrict the access for each user in a database to different host computers.

E

It can be used to selectively restrict a user's access to different applications in a specific host computer.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements apply to dynamic access lists?()

A.they offer simpler management in large internetworks.

B.you can control logging messages.

C.they allow packets to be filtered based on upper-layer session information.

D.you can set a time-based security policy.

E.they provide a level of security against spoofing.

F.they are used to authenticate individual users.


参考答案:A, F

第2题:

Which two statements apply to dynamic access lists?()

  • A、they offer simpler management in large internetworks.
  • B、you can control logging messages.
  • C、they allow packets to be filtered based on upper-layer session information.
  • D、you can set a time-based security policy.
  • E、they provide a level of security against spoofing.
  • F、they are used to authenticate individual users

正确答案:C,D

第3题:

Which three statements are true about the working of system privileges in a multitenant control database(CDB) that has pluggable databases (PDBs)?()

A. System privileges apply only to the PDB in which they are used.

B. Local users cannot use local system privileges on the schema of a common user.

C. The granter of system privileges must possess the set container privilege.

D. Common users connected to a PDB can exercise privileges across other PDBs.

E. System privileges with the with grant option container all clause must be granted to a common user before the common user can grant privileges to other users.


参考答案:A, C, E

第4题:

What is the primary purpose of creating a Location Group Policy? ()

  • A、to associate more than one realm with an authentication server
  • B、to logically group network access devices and associate them with specific sign-in policies
  • C、to allow or prevent users from accessing resources in specific locations on the network
  • D、to define the URL that users of network access devices can use to access the Infranet Controller

正确答案:B

第5题:

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()

  • A、reflexive
  • B、extended
  • C、standard
  • D、dynamic

正确答案:D

第6题:

Which two statements are true regarding the USING clause in table joins?()

  • A、It can be used to join a maximum of three tables 
  • B、It can be used to restrict the number of columns used in a NATURAL join 
  • C、It can be used to access data from tables through equijoins as well as nonequijoins 
  • D、It can be used to join tables that have columns with the same name and compatible data types

正确答案:B,D

第7题:

A member variable defined in a class can be accessed only by the classes in the same package. Which modifier should be used to obtain the access control?()         

  • A、 private
  • B、 no modifier
  • C、 public
  • D、 protected

正确答案:B

第8题:

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()

A. reflexive

B. extended

C. standard

D. dynamic


参考答案:D

第9题:

What is the maximum number of users that can be added to an autonomous access point that is being used as a local authenticator?()

  • A、75
  • B、100
  • C、25
  • D、50

正确答案:D

第10题:

Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()

  • A、It can be used to allow the access privilege settings for users but not roles.
  • B、It can be used to allow the access privilege settings for users as well as roles.
  • C、It can be used to control the time interval for which the access privilege is available to a user.
  • D、It can be used to selectively restrict the access for each user in a database to different host computers.
  • E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

正确答案:B,C,D

更多相关问题