您的位置:首页 > 其它

OCP 1Z0 052 V9.02 48

2014-06-27 13:15 344 查看
48.You want to create a role to meet these requirements:

1. The role is to be protected from unauthorized usage.

2. The password of the role is not to be embedded in the application source code or stored in a table.

Which method would you use to restrict enabling of such roles?

A. Create the role with external authentication.

B. Create the role as a secure application role.

C. Create the role as a password-protected role.

D. Create a role and use Fine-Grained Access Control (FGAC) to secure the role.

Answer: B

考点与前面158题一样

/article/8013603.html

使用 Securing Role Privileges 就可以了
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签: