zoukankan      html  css  js  c++  java
  • 053-7

    You need to configure fine-grained access control to external network resources from within your
    database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.
    Which statement is true regarding the ACL created?
    A. It is a list of remote database links stored in the XML file that are available to the users of the database.
    B. It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
    C. It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
    D. It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

    Step 1: Create the Access Control List and Its Privilege Definitions

    Use the DBMS_NETWORK_ACL_ADMIN.CREATE_ACL procedure to create the content of the access control list. It contains a name of the access control list, a brief description, and privilege settings for one user or role that you want to associate with the access control list. In an access control list, privileges for each user or role are grouped together as an access control entry (ACE). An access control list must have the privilege settings for at least one user or role.
    Network hosts accessible to the same group of users should share the same access control list.
    ACL创建后针对的对象是role,user。同一类的用户应该共享ACL。


  • 相关阅读:
    SDN第一次上机作业
    SDN第一次作业
    2017软件工程第二次作业
    Swift基础(一)
    iOS获取当前屏幕显示的viewcontroller
    Swift基础(二)
    属性和点语法
    Delphi 2008 和 C++Builder 将于8月25日发布
    为什么建议使用多重using
    .Net中Timers的学习备忘二
  • 原文地址:https://www.cnblogs.com/Babylon/p/8058911.html
Copyright © 2011-2022 走看看