单项选择题
A.by assigning profiles for the users
B.by implementing Fine-Grained Auditing (FGA)
C.by granting a secure application role to the users
D.by implementing the Database Resource Manager plan
单项选择题 View the Exhibit to observe the roles assigned to the SLP_REP user. Which statement is true about the assignment of the SELECT_CATALOG_ROLE role to the SLP_REPuser()
单项选择题 View the Exhibit and examine the user information. The user has been granted CONNECT and RESOURCE roles and no individual system privileges. TheSL_REP user executes this command to create a table: SQL> CREATE TABLE orders(oid number(6), odate date, ccode number(4), oamt number(10,2)) TABLESPACE purchase_space; The PURCHASE_SPACE tablespace already exists in the database. Which statement describes theeffect of the command()
单项选择题 You want to create a role to meet these requirements: 1:The role is to be protected from unauthorized usage. 2:The password of the role is not to be embedded in the application source code or stored in a table. Which method would you use to restrict enabling of such roles()