OCP-1Z0-053-V12 02-7题

               

7.You need to configure fine-grained access control to external network resources from within your

database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.

Which statement is true regarding the ACL created?

A. It is a list of remote database links stored in the XML file that are available to the users of the database.

B. It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.

C. It is a list of users and network privileges stored in the data dictionary according to which a group of

users can connect to one or more hosts.

D. It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your

database through PL/SQL network utility packages such as UTL_TCP.

Answer: B

答案解析:

参考:http://docs.oracle.com/cd/E11882_01/network.112/e36292/authorization.htm#DBSEG99983


The DBMS_NETWORK_ACL_ADMIN package provides the interface to administer the network Access Control List (ACL).


Create the Access Control List and Its Privilege Definitions

Use the DBMS_NETWORK_ACL_ADMIN.CREATE_ACL procedure to create the content of the access control list. It contains a name of the access control list, a brief description, and privilege settings for one user or role that you want to associate with the access control list. In an access control list, privileges for each user or role are grouped together as an access control entry (ACE). An access control list must have the privilege settings for at least one user or role.

Note:

You cannot import or export the access control list settings by using the Oracle Database import or export utilities such as Oracle Data Pump.

for example:

BEGIN
DBMS_NETWORK_ACL_ADMIN.CREATE_ACL (
  acl          => '
file_name
.xml',
  description  => '
file description
',
  principal    => '
user_or_role
',
  is_grant     => TRUE|FALSE,
  privilege    => 'connect|resolve',
  start_date   => null|
timestamp_with_time_zone
,
  end_date     => null|
timestamp_with_time_zone
);
END;

In this specification:

  • acl: Enter a name for the access control list XML file. Oracle Database creates this file relative to the /sys/acls directory in the XML DB Repository in the database. Include the .xml extension. For example:

    acl => 'us-example-com-permissions.xml',
  • description: Enter a brief description of the purpose of this file. For example:

    description => 'Network connection permission for ACCT_MGR role',
  • principal: Enter the first user account or role being granted or denied permissions. For example:

    principal => 'ACCT_MGR',

    Enter the name of the user account or role in case sensitive characters. For example, if the database stores the role name ACCT_MGR in all capital letters, entering it in mixed or lower case will not work. You can find the user accounts and roles in the current database instance by querying the DBA_USERSand DBA_ROLES data dictionary views. Typically, user names and roles are stored in upper-case letters.

    If you want to enter multiple users or grant additional privileges to this user or role, use the DBMS_NETWORK_ACL.ADD_PRIVILEGE procedure (described next) after you have created this access control list XML file.

  • is_grant: Enter either TRUE or FALSE, to indicate whether the privilege is to be granted or denied. For example:

    is_grant => TRUE,
  • privilege: Enter either connect or resolve. This setting is case sensitive, so always enter it in lowercase. For example:

    privilege => 'connect',

    The connect privilege grants the user permission to connect to a network service at an external host. The resolve privilege grants the user permission to resolve a network host name or an IP address.

    A database user needs the connect privilege to an external network host computer if he or she is connecting using the UTL_TCPUTL_SMTPUTL_MAIL,UTL_HTTP, the DBMS_LDAP package, and the HttpUriType type. To resolve the host name that was given a host IP address, or the IP address that was given a host name, with the UTL_INADDR package, grant the database user the resolve privilege instead.

    start_date: (Optional) Enter the start date for the access control entry (ACE), in TIMESTAMP WITH TIME ZONE format (YYYY-MM-DD HH:MI:SS.FF TZR). When specified, the access control entry will be valid only on or after the specified date. The default is null. For example, to set a start date of February 28, 2008, at 6:30 a.m. in San Francisco, California, U.S., which is in the Pacific time zone:

  • start_date => '2008-02-28 06:30:00.00 US/Pacific',

    The NLS_TIMESTAMP_FORMAT initialization parameter sets the default timestamp format. 

  • end_date: (Optional) Enter the end date for the access control entry (ACE), in TIMESTAMP WITH TIME ZONE format (YYYY-MM-DD HH:MI:SS.FF TZR). When specified, the access control entry expires after the specified date. The end_date setting must be greater than or equal to the start_date setting. The default is null.

    For example, to set an end date of December 10, 2008, at 11:59 p.m. in San Francisco, California, U.S., which is in the Pacific time zone:

    end_date => '2008-12-10 23:59:00.00 US/Pacific');
           

再分享一下我老师大神的人工智能教程吧。零基础!通俗易懂!风趣幽默!还带黄段子!希望你也加入到我们人工智能的队伍中来!https://blog.csdn.net/jiangjunshow

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值