Modify the value for the UTL_FILE_DIR parameter in the parameter file
Grant read and write privilege on the operating system path to the database users
Modify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter file
Modify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter file
Create a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users
第1题:
ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()
第2题:
In your Certkiller .com production database, you find that the database users are able to create and read files with unstructured data, available in any location on the host machine from an application. You want to restrict the database users to access files in a specific location on the host machine. What could do to achieve this?()
第3题:
You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.
You want to minimize changes to your security model and to your database applications. How should you modify the database?
A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.
B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.
C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.
D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.
第4题:
You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()
第5题:
Your production database uses an Automatic Storage Management (ASM) instance to manage its files. You want to add a new disk group to the ASM instance to manage the increased data load. What action would you perform to include the new disk group in the ASM instance without causing any impact on the currently connected users?()
第6题:
In Recovery Manager (RMAN), you are taking image copies of the data files of your production database and rolling them forward at regular intervals. You attempt to restart your database. After a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the data file by using the image copy. Because a media failure caused the data file to be damaged, you want to place the d ata file in a different location while restoring the file. Which option must you consider for this task?()
第7题:
You want to create a new optimized database for your transactional production environment to be used by a financial application. While creating the database, you want the Oracle software to take care of all basic settings to optimize the database performance. Which method would you use to achieve this objective?()
第8题:
You work as a database administrator at Certkiller .com. Your production database uses an Automatic Storage Management (ASM) instance to manage its files. You want to add a new disk group to the ASM instance to manage the increased data load. What action would you perform to include the new disk group in the ASM instance without causing any impact on the currently connected users?()
第9题:
Due to media failure you lost one of the data files belonging to the USERS tablespace, and the tablespace is not available to use. Which statement regarding the status of the database is true?()
第10题:
In your Supportcenter.cn production database,you find that the database users are able to create and read files with unstructured data,available in any location on the host machine from an application. You want to restrict the database users to access files in a specific location on the host machine. What could do to achieve this?()