READ Free Dumps For Oracle- 1z0-146
Question ID 20556 | Which three actions can be performed by using the DBMS_ASSERT package to prevent SQL injection? |
Option A | Detect a wrong user |
Option B | Check input string length |
Option C | Verify qualified SQL names |
Option D | Validate TNS connect strings |
Option E | Verify an existing schema name |
Option F | Enclose string literals within double quotations marks |
Correct Answer | C,E,F |
Question ID 20557 | Identify the method that is used by fine-grained access(FGA). |
Option A | Using policy functions to generate predicates dynamically |
Option B | Creating triggers on corresponding tables to generate dynamic predicates |
Option C | Modifying the existing application code to include a predicate for all SQL statements |
Option D | Creating views with necessary predicates and then creating synonyms with the same name as the |
Correct Answer | A |