单项选择题

A.Create the role with global authentication.
B.Create the role with external authentication.
C.Create the role as a secure application role.
D.Create the role as a password-protected role.
E.Create a role and use Fine-Grained Access Control (FGAC) to secure the role.

相关考题

单项选择题 Examine the commands executed in the following sequence:  1:SQL> CREATE ROLE mgrrole;  2:SQL> GRANT create user,select any table,connect,resource TO mgrrole;  3:SQL> GRANT select,update ON sh.sales TO mgrrole;  4:SQL> CREATE ROLE ceo IDENTIFIED BY boss;  5:SQL> GRANT mgrrole,drop any table,create any directory TO ceo;  6:SQL> GRANT ceo TO mgrrole;  Which statement is true about the above commands()

单项选择题 Examine the following steps performed on a database instance:  1:The DBA grants the CREATE TABLE system privilege to the SKD user with ADMIN OPTION.  2:The SKD usercreates a table.  3:The SKD user grants theCREATETABLE system privilege to the HR user.  4:The HR user creates a table.  5:The DBA revokes the CREATE TABLE system privilege from SKD.  Which statement is true after step 5 is performed()

单项选择题 The user HR owns the EMP table. The user HR grants privileges to the user SCOTT by using this command:  SQL> GRANT SELECT,INSERT,UPDATE ON emp TO scott WITH GRANT OPTION; The user SCOTT executes this command to grant privileges to the user JIM: SQL> GRANT SELECT,INSERT,UPDATE ON hr.emp TO jim;  Now, the user HR decides to revoke privileges from JIM using this command: SQL> REVOKE SELECT,INSERT,UPDATE ON emp FROM jim; Which statement is true after HR issues the REVOKE command()