zoukankan      html  css  js  c++  java
  • 053-7

    You need to configure fine-grained access control to external network resources from within your
    database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.
    Which statement is true regarding the ACL created?
    A. It is a list of remote database links stored in the XML file that are available to the users of the database.
    B. It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
    C. It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
    D. It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

    Step 1: Create the Access Control List and Its Privilege Definitions

    Use the DBMS_NETWORK_ACL_ADMIN.CREATE_ACL procedure to create the content of the access control list. It contains a name of the access control list, a brief description, and privilege settings for one user or role that you want to associate with the access control list. In an access control list, privileges for each user or role are grouped together as an access control entry (ACE). An access control list must have the privilege settings for at least one user or role.
    Network hosts accessible to the same group of users should share the same access control list.
    ACL创建后针对的对象是role,user。同一类的用户应该共享ACL。


  • 相关阅读:
    手误【删库】 == 跑路,不存在的 Linux回收站
    大规模集群全网数据备份解决方案
    宝塔Nginx配置防盗链
    Markdown语法
    QFtp编程模型(二)
    Ubuntu驱动程序开发6-Linux内核启动与程序烧写
    Ubuntu下TFTP、NFS和SSH服务搭建
    ubuntu环境变量的三种设置方式
    QByteArray详解
    mysql的索引下推理解和实践
  • 原文地址:https://www.cnblogs.com/Babylon/p/8058911.html
Copyright © 2011-2022 走看看