单项选择题
A.Create the role with global authentication.
B.Create the role with external authentication.
C.Create the role as a secure application role.
D.Create the role as a password-protected role.
E.Create a role and use Fine-Grained Access Control (FGAC) to secure the role.
单项选择题 Examine the commands executed in the following sequence: 1:SQL> CREATE ROLE mgrrole; 2:SQL> GRANT create user,select any table,connect,resource TO mgrrole; 3:SQL> GRANT select,update ON sh.sales TO mgrrole; 4:SQL> CREATE ROLE ceo IDENTIFIED BY boss; 5:SQL> GRANT mgrrole,drop any table,create any directory TO ceo; 6:SQL> GRANT ceo TO mgrrole; Which statement is true about the above commands()
单项选择题 Examine the following steps performed on a database instance: 1:The DBA grants the CREATE TABLE system privilege to the SKD user with ADMIN OPTION. 2:The SKD usercreates a table. 3:The SKD user grants theCREATETABLE system privilege to the HR user. 4:The HR user creates a table. 5:The DBA revokes the CREATE TABLE system privilege from SKD. Which statement is true after step 5 is performed()
单项选择题 The user HR owns the EMP table. The user HR grants privileges to the user SCOTT by using this command: SQL> GRANT SELECT,INSERT,UPDATE ON emp TO scott WITH GRANT OPTION; The user SCOTT executes this command to grant privileges to the user JIM: SQL> GRANT SELECT,INSERT,UPDATE ON hr.emp TO jim; Now, the user HR decides to revoke privileges from JIM using this command: SQL> REVOKE SELECT,INSERT,UPDATE ON emp FROM jim; Which statement is true after HR issues the REVOKE command()