Which three are part of an access control list (ACL) when using Real Application Security?
A.
privileges
B.
schemas
C.
data realms
D.
column constraints
E.
policies
F.
data realm constraints
G.
roles
Answer:
ADF
User Votes:
A 2 votes
50%
B
50%
C
50%
D 2 votes
50%
E
50%
F 2 votes
50%
G
50%
Discussions
0/ 1000
econdeal
9 months, 2 weeks ago
In summary, the application user who logs in will only be allowed to perform operations including DML on records within the data realm, including individual rows of data, based on the application privileges in its associated ACLs. Thus, the data security policy is composed of data realm constraints and column constraints that protect the data realm by only allowing access to application users who have application privileges in the associated ACLs.
Want to join our community?
Please log in or signup in order to use this feature
In summary, the application user who logs in will only be allowed to perform operations including DML on records within the data realm, including individual rows of data, based on the application privileges in its associated ACLs. Thus, the data security policy is composed of data realm constraints and column constraints that protect the data realm by only allowing access to application users who have application privileges in the associated ACLs.