READ Free Dumps For Oracle- 1z0-146
Question ID 2795 | View the Exhibit and examine the procedure to create a trigger name based on the table name supplied to the procedure.
Which three statements are appropriate for protecting the code in the procedure from SQL injection? (Choose three.) |
Option A | A. Explicitly validate the identifier length limit. |
Option B | B. Add AUTHID DEFINER to the definition of the procedure. |
Option C | C. Use PRAGMA RESTRICT_REFERENCES in the procedure. |
Option D | D. Filter out control characters in user-supplied identifier names. |
Option E | E. Use the object ID of the table from the data dictionary to build the trigger name. |
Correct Answer | A,D,E |
Question ID 2796 | You created the SALES_ORDERS_CTX context to use the OE.SALES_ORDERS_PKG package. |
Option A | A. The user has insufficient privileges on the DBMS_SESSION package. |
Option B | B. The subprograms inside the package have not been created with the invoker's right. |
Option C | C. The THE_PREDICATE function has an insufficient number of parameters in the package. |
Option D | D. The policy is created by using SALES_ORDERS_PKG.THE_PREDICATE without a parameter. |
Correct Answer | C |