DBMS_RLS.STATIC
DBMS_RLS.DYNAMIC
DBMS_RLS.SHARED_STATIC
DBMS_RLS.CONTEXT_SENSITIVE
DBMS_RLS.SHARED_CONTEXT_SENSITIVE
第1题:
Which two firewall user authentication objects can be referenced in a security policy?()
第2题:
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
第3题:
A. An individual policy can have only one scheduler applied.
B. You must manually configure system-time updates.
C. Multiple policies can use the same scheduler.
D. Policies that do not have schedulers are not active.
第4题:
You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()
第5题:
Which two statements are true with regard to policy ordering? ()(Choose two.)
第6题:
You are designing a password management solution to meet the business and technical requirements. Which two actions should you perform?hich two actions should you perform?()
第7题:
You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()
第8题:
Which two statements apply to policy scheduling?() (Choose two.)
第9题:
You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
第10题:
Which two statements regarding the Policy Framework in Enterprise Manager (EM) are correct?()