OCP 1Z0 052 V9.02 48
2014-06-27 13:15
344 查看
48.You want to create a role to meet these requirements:
1. The role is to be protected from unauthorized usage.
2. The password of the role is not to be embedded in the application source code or stored in a table.
Which method would you use to restrict enabling of such roles?
A. Create the role with external authentication.
B. Create the role as a secure application role.
C. Create the role as a password-protected role.
D. Create a role and use Fine-Grained Access Control (FGAC) to secure the role.
Answer: B
考点与前面158题一样
/article/8013603.html
使用 Securing Role Privileges 就可以了
1. The role is to be protected from unauthorized usage.
2. The password of the role is not to be embedded in the application source code or stored in a table.
Which method would you use to restrict enabling of such roles?
A. Create the role with external authentication.
B. Create the role as a secure application role.
C. Create the role as a password-protected role.
D. Create a role and use Fine-Grained Access Control (FGAC) to secure the role.
Answer: B
考点与前面158题一样
/article/8013603.html
使用 Securing Role Privileges 就可以了
相关文章推荐
- OCP 1Z0 052 V9.02 117
- OCP 1Z0 052 V9.02 72
- OCP 1Z0 052 V9.02 177
- OCP-1Z0-051-V9.02-48题
- OCP 1Z0 052 V9.02 201
- OCP-1Z0-052-V9.02-72题
- OCP 1Z0 052 48
- OCP-1Z0-052-V9.02-116题
- OCP-1Z0-052-V9.02-177题
- OCP-1Z0-052-V9.02-115题
- OCP-1Z0-052-V8.02-48题
- OCP-1Z0-052-V9.02-201题
- OCP 1Z0 052 V9.02 115
- OCP-1Z0-052-V9.02-1题
- OCP 1Z0 052 V9.02 116
- OCP 1Z0 052 71
- OCP 1Z0 052 87
- OCP 1Z0 052 103
- OCP 1Z0 052 117
- OCP 1Z0 052 127