<< Prev Question Next Question >>

Question 5/29

Examine this configuration and requirement:
1. The hr user created a private database link in the pdb2 pluggable database linking to the hr schema In the PDBl pluggable database.
2. Other users in pdb2 must query the remote HR.EMPLOYEES table In PDBI using this database link.
Which two operations together ensure that the database link provides access only to the HR.EMPLOYEES table in the PDBI pluggable database?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (29q)
Question 1: Which two represent the set of users that are never affected...
Question 2: While upgrading your Oracle database server from 10g to 19c,...
Question 3: An audit administrator wants to log Client Context variables...
Question 4: Examine this output: (Exhibit) Which three are true?...
Question 5: Examine this configuration and requirement: 1. The hr user c...
Question 6: User jane must report on who has done RMAN backups on a data...
Question 7: Which two statements are true about column-level transparent...
Question 8: What does the Application Data Modeling module of the Oracle...
Question 9: For which two reasons would you define Network ACLs?...
Question 10: If a column is not specified in a Data Redaction Policy, to ...
Question 11: Which two commands can a user with the syskm privilege execu...
Question 12: You are Implementing a security policy that makes use of the...
Question 13: You Issue this statement as user SYS: audit, context namespa...
Question 14: The utl_http package is used to invoke REST API's to manage ...
Question 15: You grant user JANE the SYSDBA administrative privilege. Whi...
Question 16: Which four products, features, or methods can help facilitat...
Question 17: As the SYSKM user you must create the password-based keystor...
Question 18: Which type of masking directly masks and subsets data In a n...
Question 19: Which three are true concerning command rules?...
Question 20: Examine this sqlnet.ora file used by a client application: (...
Question 21: You are required to remove embedded passwords from scripts t...
Question 22: Which two are true about auditing in an Oracle Database?...
Question 23: What is true about the client identifier?...
Question 24: Which two authorization rights does a Database Vault realm o...
Question 25: Oracle Database Vault is enabled In the database. You have t...
Question 26: Which statement is true about Network ACLs?...
Question 27: You must rekey encrypted sensitive credential data In your d...
Question 28: Which three authentication methods are available with Centra...
Question 29: What Is the first step when analyzing security within a data...