1z0-116 question 7 discussion

View all Oracle Database Security Administration Exam here
back to oracle forum

Question 7

Which three are part of an access control list (ACL) when using Real Application Security?

  • A. privileges
  • B. schemas
  • C. data realms
  • D. column constraints
  • E. policies
  • F. data realm constraints
  • G. roles
Answer:

ADF


User Votes:
A 2 votes
50%
B
50%
C
50%
D 2 votes
50%
E
50%
F 2 votes
50%
G
50%
Discussions
0 / 1000
econdeal
9 months, 2 weeks ago

In summary, the application user who logs in will only be allowed to perform operations including DML on records within the data realm, including individual rows of data, based on the application privileges in its associated ACLs. Thus, the data security policy is composed of data realm constraints and column constraints that protect the data realm by only allowing access to application users who have application privileges in the associated ACLs.