Question 83 1 granting users limited to access data

This preview shows page 17 - 20 out of 20 pages.

Question 2.docx

1 .   Object privileges allow users to perform DML operations on the data contained within database objects .
 True
 False
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
A Guide to SQL
The document you are viewing contains questions related to this textbook.
Chapter 7 / Exercise 8
A Guide to SQL
Last/Pratt
Expert Verified
SYSTEM_PRIVILEGE_MAP
1 points QUESTION 84 1. A system privilege can be taken away from a user through the UNGRANT command. _________________________ True False
1 points QUESTION 85 1. Which of the following SQL statements will grant the SELECT privilege for the ORDERS table to all database users?
1 points QUESTION 86 1. A user can check all his or her currently enabled privileges by examining the SESSION_PRIVS view.
1 points QUESTION 87
QUESTION 83 1. Granting users limited ____________________ to access data is one security method used in Oracle12 c . PASSWORDS
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
A Guide to SQL
The document you are viewing contains questions related to this textbook.
Chapter 7 / Exercise 8
A Guide to SQL
Last/Pratt
Expert Verified
1. Object privileges allow users to perform DML operations on the data contained within database objects.
1 points QUESTION 88 1. Which of the following commands will grant a role to a user?
1 points QUESTION 89 1. A privilege with the ANY keyword is automatically a(n) ____________________ privilege since it is not associated with a specific object.
1 points QUESTION 90 1. The WITH ____________________ OPTION is required to allow the recipient to grant the object privilege(s) to other users.
1 points QUESTION 91 1. A role can be removed from the database with the DELETE ROLE command. _________________________
1 points QUESTION 92 1. Which of the following refers to the process of ensuring that individuals trying to access the system are who they say they are, thus preventing them from illegally accessing data? a . accreditation b . individualization
c . authorization d . authentication 1 points QUESTION 93 1. All the Oracle12 c system privileges can be viewed through the data dictionary view ____.
1 points QUESTION 94 1. Revoking a privilege originally granted with the WITH ____________________ OPTION will have no cascading effect on other users.
1 points QUESTION 95 1. If a user issues the ____________________ command to change his or her password, the user will be prompted for both the old and new password.
1 points QUESTION 96 1. Which of the following are examples of object privileges? a . SELECT and UPDATE b . all of the above c . UPDATE ANY TABLE and ALTER ANY TABLE d . CREATE USER and CREATE TABLE
1 points QUESTION 97 1. The ____________________ clause of the GRANT command specifies the user(s) or role(s) receiving the privilege. 1 points QUESTION 98 1. An object privilege cannot be granted to a role with the WITH GRANT OPTION. TO
1 points QUESTION 99 1. Which of the following privileges is necessary to perform the connection procedure shown above? a . ACCESS DATABASE b . CREATE ANY TABLE c . CONNECTION d . CREATE SESSION
1 points QUESTION 100 1. Even if a set of privileges have been assigned to a role, it does not make it any easier for the DBA since the privileges will still need to be granted individually to the users.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture