多选题Which two statements accurately describe a role? ()AA role can be given to a maximum of 1000 users.BA user can have access to a maximum of 10 roles.CA role can have a maximum of 100 privileges contained in it.DPrivileges are given to a role by using th

题目
多选题
Which two statements accurately describe a role? ()
A

A role can be given to a maximum of 1000 users.

B

A user can have access to a maximum of 10 roles.

C

A role can have a maximum of 100 privileges contained in it.

D

Privileges are given to a role by using the CREATE ROLE statement.

E

A role is a named group of related privileges that can be granted to the user.

F

A user can have access to several roles, and several users can be assigned the same role.


相似考题
参考答案和解析
正确答案: C,A
解析: 暂无解析
更多“多选题Which two statements accurately describe a role? ()AA role can be given to a maximum of 1000 users.BA user can have access to a maximum of 10 roles.CA role can have a maximum of 100 privileges contained in it.DPrivileges are given to a role by using th”相关问题
  • 第1题:

    A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()

    • A、A custom logo on the user interface page
    • B、A maximum timeout value of 600 minutes
    • C、A maximum time out value of 1200 minutes
    • D、A default Juniper Networks logo on the user interface page

    正确答案:C,D

  • 第2题:

    Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()

    • A、Every  tag must have at least one  tag.
    • B、A  tag can have many  tags.
    • C、A given  tag can apply to only one  tag.
    • D、A given  tag can contain from zero to many  tags.
    • E、It is possible to construct a valid  tag such that,for a given resource,no user rolescan access that resource.

    正确答案:B,E

  • 第3题:

    Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()

    • A、<auth-constraint/>
    • B、<auth-constraint><role-name>*</role-name></auth-constraint>
    • C、<auth-constraint><role-name>ANY</role-name></auth-constraint>
    • D、<auth-constraint><role-name>MARKETING</role-name></auth-constraint>

    正确答案:B,D

  • 第4题:

    View the Exhibit to observe the roles assigned to the SL_REP user.  Which statement is true about theassignment of the SELECT_CATALOG_ROLE role to the SL_REP user()

    • A、The user must enable the role explicitly.
    • B、The user can grant the role to other users.
    • C、The user cannot use the role until the DBA enables it explicitly.
    • D、The user can start using the role immediately without any changes

    正确答案:A

  • 第5题:

    You have been asked to create three users, PUB1, PUB2 and PUB3, for three newly hired employees and to allocate unlimited quota on their default tablespace PUBLISHER_TBS with no other privileges. After creating the users, which method can you use for granting the required privileges?()

    • A、grant CONNECT role to all of the three users
    • B、grant RESOURCE role to all of the three users
    • C、grant both CONNECT and RESOURCE role to all of the three users
    • D、execute ALTER USER .. QUOTA UNLIMITED ON publisher_tbs command for all of the three users
    • E、create role with UNLIMITED TABLESPACE system privilege and assign the role to all of the three users

    正确答案:D

  • 第6题:

    You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB01 in the instance. The company CIO wants all the application developers can capture traces to troubleshoot the application that uses the database DB1, and they can perform this by using SQL Server Profiler. But they have to be given as little permission as possible. The company CIO assigns this task to you.  So what action should you perform to achieve this goal?()  

    • A、All the SQL Server logins of the application developers have to be added to a fixed server role. 
    • B、All the database users of the application developers have to be added to a fixed database role 
    • C、All SQL Server logins of the application developers should be given the appropriate server-level permissions. 
    • D、All database users of the application developers should be given the appropriate database-level permissions. 

    正确答案:C

  • 第7题:

    多选题
    Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()
    A

    <auth-constraint/>

    B

    <auth-constraint><role-name>*</role-name></auth-constraint>

    C

    <auth-constraint><role-name>ANY</role-name></auth-constraint>

    D

    <auth-constraint><role-name>MARKETING</role-name></auth-constraint>


    正确答案: C,D
    解析: 暂无解析

  • 第8题:

    单选题
    View the Exhibit to observe the roles assigned to the SL_REP user.  Which statement is true about theassignment of the SELECT_CATALOG_ROLE role to the SL_REP user()
    A

    The user must enable the role explicitly.

    B

    The user can grant the role to other users.

    C

    The user cannot use the role until the DBA enables it explicitly.

    D

    The user can start using the role immediately without any changes


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()
    A

    The user cannot use the role at all.

    B

    The role would not be granted to the user.

    C

    The user needs to enable the role explicitly.

    D

    The user can start using the role immediately.

    E

    The user would have the admin option for the role.


    正确答案: C
    解析: 暂无解析

  • 第10题:

    多选题
    Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()
    A

    <auth-constraint/>

    B

    <auth-constraint><role-name>*</role-name></auth-constraint>

    C

    <auth-constraint><role-name>ANY</role-name></auth-constraint>

    D

    <auth-constraint><role-name>MARKETING</role-name></auth-constraint>


    正确答案: A,C
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true about the roles in the Oracle database?()
    A

    A role can be granted to itself.

    B

    Roles are owned by the SYS user.

    C

    Roles can be granted to other roles.

    D

    A role cannot be assigned external authentication.

    E

    A role can contain both system and object privileges.


    正确答案: E,D
    解析: 暂无解析

  • 第12题:

    多选题
    Given: 3.class MyServlet extends HttpServlet { 4.public void doPut(HttpServletRequest req, HttpServletResponse resp) throws ServletException,IOException { 5.// servlet code here ... 26.} 27.} If the DD contains a single security constraint associated with MyServlet and its only  tagsand  tags are:GETPUT Admin Which four requests would be allowed by the container?()
    A

    A user whose role is Admin can perform a PUT.

    B

    A user whose role is Admin can perform a GET.

    C

    A user whose role is Admin can perform a POST.

    D

    A user whose role is Member can perform a PUT.

    E

    A user whose role is Member can perform a POST.

    F

    A user whose role is Member can perform a GET.


    正确答案: F,A
    解析: 暂无解析

  • 第13题:

    You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()

    • A、The user cannot use the role at all.
    • B、The role would not be granted to the user.
    • C、The user needs to enable the role explicitly.
    • D、The user can start using the role immediately.
    • E、The user would have the admin option for the role.

    正确答案:C

  • 第14题:

    On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()

    • A、Sign-in Policy
    • B、Role Mapping Rule
    • C、Role Restrictions
    • D、Trusted Server CA

    正确答案:B,C

  • 第15题:

    Given: 3.class MyServlet extends HttpServlet { 4.public void doPut(HttpServletRequest req, HttpServletResponse resp) throws ServletException,IOException { 5.// servlet code here ... 26.} 27.} If the DD contains a single security constraint associated with MyServlet and its only  tagsand  tags are:GETPUT Admin Which four requests would be allowed by the container?()

    • A、A user whose role is Admin can perform a PUT.
    • B、A user whose role is Admin can perform a GET.
    • C、A user whose role is Admin can perform a POST.
    • D、A user whose role is Member can perform a PUT.
    • E、A user whose role is Member can perform a POST.
    • F、A user whose role is Member can perform a GET.

    正确答案:A,B,C,E

  • 第16题:

    Which two statements accurately describe a role?()

    • A、A role can be given to a maximum of 1000 users.
    • B、A user can have access to a maximum of 10 roles.
    • C、A role can have a maximum of 100 privileges contained in it.
    • D、Privileges are given to a role by using the CREATE ROLE statement.
    • E、A role is a named group of related privileges that can be granted to the user.
    • F、A user can have access to several roles, and several users can be assigned the same role.

    正确答案:E,F

  • 第17题:

    Which two statements are true about the roles in the Oracle database?()

    • A、A role can be granted to itself.
    • B、Roles are owned by the SYS user.
    • C、Roles can be granted to other roles.
    • D、A role cannot be assigned external authentication.
    • E、A role can contain both system and object privileges.

    正确答案:C,E

  • 第18题:

    多选题
    Which two statements are true regarding the USING clause in table joins?()
    A

    It can be used to join a maximum of three tables

    B

    It can be used to restrict the number of columns used in a NATURAL join

    C

    It can be used to access data from tables through equijoins as well as nonequijoins

    D

    It can be used to join tables that have columns with the same name and compatible data types


    正确答案: A,C
    解析: 暂无解析

  • 第19题:

    多选题
    Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()
    A

    Every  tag must have at least one  tag.

    B

    A  tag can have many  tags.

    C

    A given  tag can apply to only one  tag.

    D

    A given  tag can contain from zero to many  tags.

    E

    It is possible to construct a valid  tag such that,for a given resource,no user rolescan access that resource.


    正确答案: D,A
    解析: 暂无解析

  • 第20题:

    多选题
    You execute the following piece of code with appropriate privileges: User SCOTT has been granted theCREATE SESSION privilege and the MGR role.Which two statements are true when a session logged in as SCOTT queries the SAL column in the viewand the table?()
    A

    Data is redacted for the EMP.SAL column only if the SCOTT session does not have the MGR role set.

    B

    Data is redacted for EMP.SAL column only if the SCOTT session has the MGR role set.

    C

    Data is never redacted for the EMP_V.SAL column.

    D

    Data is redacted for the EMP_V.SAL column only if the SCOTT session has the MGR role set.

    E

    Data is redacted for the EMP_V.SAL column only if the SCOTT session does not have the MGR role set.


    正确答案: E,A
    解析: 暂无解析

  • 第21题:

    多选题
    Examine the code:   CREATE ROLE readonly IDENTIFIES USING app.chk_readwrite ; CREATE ROLE readwrite IDENTIFIED USING app.chk_readwrite ;   CREATE OR REPLACE PROCEDURE app.chk_readwrite  AUTHID CURRENT_USER IS  ipchk STRING(30);  BEGIN  IF sys_context(‘USERENV’,’ISDBA’)=’TRUE’  THEN DBMS_SESSION.SET_ROLE‘READWRITE’) ;  ELSE DBMS_SESSION.SET_ROLE(‘READONLY’) ;  END; /   Which three statements correctly describe the Secure Application role definition?()
    A

    No user or application has to remember or hide a password.

    B

    It prevents everyone except a true DBA session from acquiring the READWRITE role.

    C

    app.chk_readwrite is called whenever a user tries to access rows protected by the READONLY or READWRITE label.

    D

    app.chk_readwrite is called by users or applications when they want to enable the READONLY or READWRITE role.


    正确答案: A,D
    解析: 暂无解析

  • 第22题:

    单选题
    View the Exhibit and examine the privileges granted to the MGR_ROLE role. The user SKD has been grantedthe CONNECT and RESOURCE roles only. The database administrator (DBA) grants MGR_ROLE to the userSKD by executing the command: SQL> GRANT MGR_ROLE TO SKD WITH ADMIN OPTION;  Which statement is true about the user SKD afterhe/she is granted this role()
    A

    The user SKD can grant only the MGR_ROLE role to other users, but not the privileges in it.

    B

    The user SKD can revoke the MGR_ROLE only from the users for whom he/she is the grantor.

    C

    The user SKD can grant the privileges in the MGR_ROLE role to other users, but not with ADMIN OPTION.

    D

    The user SKD can grant the privileges in the MGR_ROLE role to other users, but cannot revoke privilegesfrom them


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements accurately describe a role?()
    A

    A role can be given to a maximum of 1000 users.

    B

    A user can have access to a maximum of 10 roles.

    C

    A role can have a maximum of 100 privileges contained in it.

    D

    Privileges are given to a role by using the CREATE ROLE statement.

    E

    A role is a named group of related privileges that can be granted to the user.

    F

    A user can have access to several roles, and several users can be assigned the same role.


    正确答案: E,A
    解析: 暂无解析

  • 第24题:

    多选题
    A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()
    A

    A custom logo on the user interface page

    B

    A maximum timeout value of 600 minutes

    C

    A maximum time out value of 1200 minutes

    D

    A default Juniper Networks logo on the user interface page


    正确答案: D,C
    解析: 暂无解析