zoukankan      html  css  js  c++  java
  • 053-7

    You need to configure fine-grained access control to external network resources from within your
    database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.
    Which statement is true regarding the ACL created?
    A. It is a list of remote database links stored in the XML file that are available to the users of the database.
    B. It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
    C. It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
    D. It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

    Step 1: Create the Access Control List and Its Privilege Definitions

    Use the DBMS_NETWORK_ACL_ADMIN.CREATE_ACL procedure to create the content of the access control list. It contains a name of the access control list, a brief description, and privilege settings for one user or role that you want to associate with the access control list. In an access control list, privileges for each user or role are grouped together as an access control entry (ACE). An access control list must have the privilege settings for at least one user or role.
    Network hosts accessible to the same group of users should share the same access control list.
    ACL创建后针对的对象是role,user。同一类的用户应该共享ACL。


  • 相关阅读:
    53. Maximum Subarray
    64. Minimum Path Sum
    28. Implement strStr()
    26. Remove Duplicates from Sorted Array
    21. Merge Two Sorted Lists
    14. Longest Common Prefix
    7. Reverse Integer
    412. Fizz Buzz
    linux_修改域名(centos)
    linux_redis常用数据类型操作
  • 原文地址:https://www.cnblogs.com/Babylon/p/8058911.html
Copyright © 2011-2022 走看看