Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()A、It can be used to allow the access privilege settings for users but not roles.B、It can be used to allow the access privilege settings for users as well as roles.C、It can

题目

Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()

  • A、It can be used to allow the access privilege settings for users but not roles.
  • B、It can be used to allow the access privilege settings for users as well as roles.
  • C、It can be used to control the time interval for which the access privilege is available to a user.
  • D、It can be used to selectively restrict the access for each user in a database to different host computers.
  • E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

相似考题
更多“Which statements describe the ca”相关问题
  • 第1题:

    Which two of these statements best describe the benefits of WPAv2? (Choose two.)()

    • A、 SSID broadcast prevention
    • B、 man-in-the-middle attack protection
    • C、 cost reduction through software upgrades in all existing hardware
    • D、 dynamic key generation
    • E、 RF jamming prevention

    正确答案:B,D

  • 第2题:

    Which two statements accurately describe an IBGP peering session?() (Choose two.)

    • A、Peers are statically defined.
    • B、Peers exist within the same AS.
    • C、Peers must be directly connected to each other.
    • D、Peers advertise routes learned from other IBGP neighbors.

    正确答案:A,B

  • 第3题:

    Which two of these statements best describe the benefits of WPAv1? ()

    • A、 SSID broadcast prevention
    • B、 Improved mutual authentication
    • C、 Improved encryption through AES
    • D、 Improved protection against sniffing initialization vectors
    • E、 RF jamming prevention

    正确答案:B,D

  • 第4题:

    Which two of these statements best describe fast secure roaming? (Choose two.)()  

    • A、 available only in autonomous APs
    • B、 available in autonomous and lightweight APs
    • C、 a feature of WDS in autonomous APs
    • D、 a feature of WDS in lightweight APs
    • E、 requires at least one AP and one Wireless LAN Services Module

    正确答案:B,C

  • 第5题:

    单选题
    Which of the following statements is NOT true?
    A

    People may have different personalities.

    B

    People differ from each other in appearance.

    C

    People can learn to recognize human faces.

    D

    People can describe all human features of others.


    正确答案: B
    解析:
    结论推断题。答案出处为文章第一段:Even a skilled writer probably could not describe all the features that make a face difference from another. A, B, C三项均可以在原文第一、二段找到对应表述。

  • 第6题:

    多选题
    Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet?()
    A

    Full-duplex Ethernet uses CSMA/CD to prevent collisions.

    B

    Half-duplex Ethernet uses a loopback circuit to detect collisions.

    C

    A full-duplex Ethernet card allows 20Mbps for data transmission.

    D

    Full-duplex Ethernet makes use of two pairs of wires for data.

    E

    An Ethernet hub can operate both half and full duplex simultaneously.


    正确答案: C,A
    解析: 暂无解析

  • 第7题:

    多选题
    Which two statements accurately describe a broadcast domain?()
    A

    Broadcast domains require that the participating devices connect to common switches or hubs

    B

    Broadcast domains consist of devices reachable by frames addressed to the Layer 2 broadcast address

    C

    Broadcast domains require a gateway device such as a router

    D

    Broadcast domains consist of devices that reside on the same VLAN


    正确答案: A,C
    解析: 暂无解析

  • 第8题:

    多选题
    Which two statements accurately describe a role?()
    A

    A role can be given to a maximum of 1000 users.

    B

    A user can have access to a maximum of 10 roles.

    C

    A role can have a maximum of 100 privileges contained in it.

    D

    Privileges are given to a role by using the CREATE ROLE statement.

    E

    A role is a named group of related privileges that can be granted to the user.

    F

    A user can have access to several roles, and several users can be assigned the same role.


    正确答案: F,D
    解析: 暂无解析

  • 第9题:

    Which two statements complete a transaction? ()

    • A、DELETE employees;
    • B、DESCRIBE employees;
    • C、ROLLBACK TO SAVEPOINT C;
    • D、GRANT SELECT ON employees TO SCOTT;
    • E、ALTER TABLE employees SET UNUSED COLUMN sal;
    • F、SELECT MAX(sal) FROM employees WHERE department_id = 20;

    正确答案:D,E

  • 第10题:

    While deploying a new application module, the software vendor ships the application software along with appropriate SQL plan baselines for the new SQLs being introduced. Which two statements describe the consequences?()

    • A、The plan baselines can be evolved over time to produce better performance.
    • B、The newly generated plans are directly placed into the SQL plan baseline without being verified.
    • C、The new SQL statements initially run with the plans that are known to produce good performance under standard test configuration.
    • D、The optimizer does not generate new plans for the SQL statements for which the SQL plan baseline has been imported.

    正确答案:A,C

  • 第11题:

    Which two statements describe the advantages to the use of RIP over the use of OSPF?()

    • A、RIP requires less time to converge
    • B、RIP uses less bandwidth
    • C、RIP is less complex to configure
    • D、RIP demands fewer router resources
    • E、RIP has a more accurate metric

    正确答案:C,D

  • 第12题:

    Which three statements describe how the strict SQL mode provides added security?()

    • A、It rejects statements that try to insert out-of-range values
    • B、It rejects invalid dates
    • C、It limits the operations that the server can perform
    • D、It rejects queries that produce out-of-range values
    • E、It rejects dates with zero day or month values

    正确答案:A,B,E

  • 第13题:

    多选题
    Which two of these statements best describe the benefits of WPAv1? ()
    A

    SSID broadcast prevention

    B

    Improved mutual authentication

    C

    Improved encryption through AES

    D

    Improved protection against sniffing initialization vectors

    E

    RF jamming prevention


    正确答案: A,E
    解析: 暂无解析

  • 第14题:

    多选题
    Which two statements describe the purpose of a security policy?()
    A

    It enables traffic counting and logging.

    B

    It enforces a set of rules for transit traffic.

    C

    It controls host inbound services on a zone.

    D

    It controls administrator rights to access the device.


    正确答案: B,D
    解析: 暂无解析

  • 第15题:

    多选题
    Which three statements describe how the strict SQL mode provides added security?()
    A

    It rejects statements that try to insert out-of-range values

    B

    It rejects invalid dates

    C

    It limits the operations that the server can perform

    D

    It rejects queries that produce out-of-range values

    E

    It rejects dates with zero day or month values


    正确答案: B,D
    解析: 暂无解析