zoukankan      html  css  js  c++  java
  • 053-7

    You need to configure fine-grained access control to external network resources from within your
    database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.
    Which statement is true regarding the ACL created?
    A. It is a list of remote database links stored in the XML file that are available to the users of the database.
    B. It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
    C. It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
    D. It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

    Step 1: Create the Access Control List and Its Privilege Definitions

    Use the DBMS_NETWORK_ACL_ADMIN.CREATE_ACL procedure to create the content of the access control list. It contains a name of the access control list, a brief description, and privilege settings for one user or role that you want to associate with the access control list. In an access control list, privileges for each user or role are grouped together as an access control entry (ACE). An access control list must have the privilege settings for at least one user or role.
    Network hosts accessible to the same group of users should share the same access control list.
    ACL创建后针对的对象是role,user。同一类的用户应该共享ACL。


  • 相关阅读:
    kafka 配置属性
    mybatis 启动流程源码分析(二)之 Configuration-Properties解析
    mybatis 配置文件
    mybatis 启动流程源码分析(一)
    mybatis configuration
    使用函数式编程替换if-else
    mybatis 基本使用
    第十二周学习笔记
    T-SQL的进阶:超越基本级别3:构建相关子查询——701小组
    第十周学习笔记
  • 原文地址:https://www.cnblogs.com/Babylon/p/8058911.html
Copyright © 2011-2022 走看看