READ Free Dumps For Oracle- 1z0-146
Question ID 2785 | Examine the following line of code that is part of a PL/SQL application: stmt:='SELECT session_id FROM sessions WHERE ' || p_where_stmt; Identify a solution for preventing SQL injection in the above code. |
Option A | A. Replace P_WHERE_STMT with a bind variable. |
Option B | B. Do not use APIs that allow arbitrary query parameters to be exposed. |
Option C | C. Use the RESTRICT_REFERENCES clause in the PL/SQL subprogram that contains the code. |
Option D | D. Use DBMS_SQL to detect that the expression provided for P_WHERE_STMT is free from SQL injection. |
Correct Answer | B |
Question ID 2786 | Which two conditions must be true for a PL/SQL function to be result cached? (Choose two.) |
Option A | A. It must be part of a package. |
Option B | B. It must be a pipelined table function. |
Option C | C. It must not be defined in an anonymous block. |
Option D | D. It must have at least one OUT or IN OUT parameter. |
Correct Answer | C,D |