单项选择题
You want to create a role to meet these requirements:
1. The role is to be protected from unauthorized usage.
2. The password of the role is not to be embedded in the application source code or stored in a table.
method would you use to restrict enabling of such roles()
A.Create the role with external authentication.
B.Create the role as a secure application role.
C.Create the role as a password-protected role.
D.Create a role and use Fine-Grained Access Control (FGAC) to secure the role
相关考题
-
单项选择题
Youhaveexecutedthiscommandtochangethesizeofthedatabasebuffercache: SQL>ALTERSYSTEMSETDB_CACHE_SIZE=2516582; Systemaltered.Toverifythechangeinsize,youexecutedthiscommand:SQL>SHOWPARAMETERDB_CACHE_SIZENAMETYPEVALUE ------------------------------------------------db_cache_sizebiginteger4194304 Whyisthevaluesetto4194304andnotto2516582()
A.Because 4194304 is the granule size
B.Because 4194304 is the standard block size
C.Because 4194304 is the largest nonstandard block size defined in the database
D.Because 4194304 is the total size of data already available in the database buffer cache -
多项选择题
You notice that the performance of the database has degraded because of frequent checkpoints. Which twoactions resolve the issue()
A.Disable automatic checkpoint tuning.
B.Check the size of the redo log file size and increase the size if it is small.
C.Set the FAST_START_MTTR_TARGET parameter as per the advice given by the MTTR Advisor.
D.Decrease the number of redo log members if there are more than one redo log members available in eachredo log group. -
多项选择题
Examinethecommand: SQL>ALTERUSERskdACCOUNTLOCK; Whichtwostatementsaretrueafterthecommandisexecuted()
A.The SKD user cannot log in to the database instance.
B.The objects owned by the SKD user are not accessible to any user.
C.The other users can access the objects owned by the SKD user, on which they have access.
D.The password for the SKD user expires and the user is forced to change the password at the next log in
