单项选择题
A. by granting a secure application role to the users
B. by creating and assigning a profile to the users and setting the REMOTE_OS_AUTHENT parameter to false
C. By creating and assigning a profile to the users and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameter to 4
D. By Implementing Fine-Grained Auditing (FGA) and setting the REMOTE_LOGIN_PASSWORD_FILE parameter to none.
E. By implementing the database resource Manager plan and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameters to 4.
多项选择题 You administer an online transaction processing (OLTP) system whose database is stored in Automatic Storage Management (ASM) and whose disk group use normal redundancy. One of the ASM disks goes offline, and is then dropped because it was not brought online before DISK_REPAIR_TIME elapsed. When the disk is replaced and added back to the disk group, the ensuing rebalance operation is too slow. Which two recommendations should you make to speed up the rebalance operation if this type of failure happens again?()
多项选择题 Identify three valid methods of opening, pluggable databases (PDBs).()
多项选择题 You executed this command to create a password file: $ orapwd file = orapworcl entries = 10 ignorecase = N Which two statements are true about the password file?()