多选题You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()ADBMS_R

题目
多选题
You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()
A

DBMS_RLS.STATIC

B

DBMS_RLS.DYNAMIC

C

DBMS_RLS.SHARED_STATIC

D

DBMS_RLS.CONTEXT_SENSITIVE

E

DBMS_RLS.SHARED_CONTEXT_SENSITIVE

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two firewall user authentication objects can be referenced in a security policy?()

  • A、access profile
  • B、client group
  • C、client
  • D、default profile

正确答案:B,C

第2题:

Which should be the key driver for a company security policy’s creation, implementation and enforcement?()

  • A、 the business knowledge of the IT staff
  • B、 the technical knowledge of the IT staff
  • C、 the company’s business objectives
  • D、 the company’s network topology
  • E、 the IT future directions

正确答案:C

第3题:

Which two statements apply to policy scheduling?() (Choose two.)

A. An individual policy can have only one scheduler applied.

B. You must manually configure system-time updates.

C. Multiple policies can use the same scheduler.

D. Policies that do not have schedulers are not active.


参考答案:A, C

第4题:

You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()

  • A、 DBMS_RLS.STATIC
  • B、 DBMS_RLS.DYNAMIC
  • C、 DBMS_RLS.SHARED_STATIC
  • D、 DBMS_RLS.CONTEXT_SENSITIVE
  • E、 DBMS_RLS.SHARED_CONTEXT_SENSITIVE

正确答案:C,E

第5题:

Which two statements are true with regard to policy ordering? ()(Choose two.)

  • A、The last policy is the default policy, which allows all traffic.
  • B、The order of policies is not important.
  • C、New policies are placed at the end of the policy list.
  • D、The insert command can be used to change the order.

正确答案:C,D

第6题:

You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()

  • A、 Delegate the password management controls to the help desk staff.
  • B、 Delegate the password management controls to the Domain Users group.
  • C、 Configure the Default Domain Policy to enforce password expiration settings.
  • D、 Configure the Default Domain Controller Policy to enforce password expiration settings.

正确答案:B,D

第7题:

You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()

  • A、Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.
  • B、Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.
  • C、Configure the Host Checker policy as a role restriction for the Employee role.
  • D、Configure the Host Checker policy as a resource access policy for the Employee role.

正确答案:B,C

第8题:

Which two statements apply to policy scheduling?() (Choose two.)

  • A、An individual policy can have only one scheduler applied.
  • B、You must manually configure system-time updates.
  • C、Multiple policies can use the same scheduler.
  • D、Policies that do not have schedulers are not active.

正确答案:A,C

第9题:

You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()

  • A、The endpoints can use agentless access.
  • B、Encrypted traffic flows between the endpoint and the enforcer.
  • C、Encrypted traffic flows between the endpoint and the protected resource
  • D、The endpoints can use the Odyssey Access Client.

正确答案:B,D

第10题:

Which two statements regarding the Policy Framework in Enterprise Manager (EM) are correct?()

  • A、Policy violations are prioritized as High, Medium, or Informational by category 
  • B、Policies can be disabled completely, or flagged as ignored, for the specified target 
  • C、Policies can be flagged as ignored, but never completely disabled, for the specified target
  • D、Policy violations must be corrected, otherwise the database will shut down until corrective action occurs

正确答案:A,B

更多相关问题