053-7

You need to configure fine-grained access control to external network resources from within your
database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.
Which statement is true regarding the ACL created?
A. It is a list of remote database links stored in the XML file that are available to the users of the database.
B. It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
C. It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
D. It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

Step 1: Create the Access Control List and Its Privilege Definitions

Use the DBMS_NETWORK_ACL_ADMIN.CREATE_ACL procedure to create the content of the access control list. It contains a name of the access control list, a brief description, and privilege settings for one user or role that you want to associate with the access control list. In an access control list, privileges for each user or role are grouped together as an access control entry (ACE). An access control list must have the privilege settings for at least one user or role.
Network hosts accessible to the same group of users should share the same access control list.
ACL创建后针对的对象是role,user。同一类的用户应该共享ACL。


posted @ 2017-12-18 18:00  巴啦啦大魔王  阅读(132)  评论(0编辑  收藏  举报