Preview

07: Password and Ref

Satisfactory Essays
Open Document
Open Document
4381 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
07: Password and Ref
Chapter 7: User Creation and Management

TRUE/FALSE

1. Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.

ANS: T PTS: 1 REF: 196

2. User names in Oracle10g can consist of up to 30 characters.

ANS: T PTS: 1 REF: 196

3. The password for a user can be set with the PASSWORD clause of the CREATE USER command.

ANS: F PTS: 1 REF: 197

4. Permissions allow users to execute certain SQL statements in Oracle10g.

ANS: F PTS: 1 REF: 198

5. Object privileges allow users to perform DML operations on the data contained within database objects.

ANS: T PTS: 1 REF: 198

6. The INSERT, UPDATE, and DELETE object privileges can be applied to tables and views.

ANS: T PTS: 1 REF: 200

7. Both system and object privileges can be granted with the GRANT command.

ANS: T PTS: 1 REF: 199-200

8. A user can be granted both system and object privileges in the same GRANT command.

ANS: F PTS: 1 REF: 199-200

9. The GRANT clause of the GRANT command identifies the user who is granting a specific privilege.

ANS: F PTS: 1 REF: 199-201

10. The WITH GRANT OPTION is required to allow a user to grant the specified object privileges to other users.

ANS: T PTS: 1 REF: 201

11. The system privileges available in Oracle10g can be viewed through the SYSTEM_PRIVILEGE_MAP data dictionary view.

ANS: T PTS: 1 REF: 198

12. The UPDATE ANY TABLE privilege is a system privilege.

ANS: F PTS: 1 REF: 200

13. Any privilege with the ANY keyword in it is automatically an object privilege.

ANS: F PTS: 1 REF: 198

14. The ON clause of the GRANT command is used to specify which objects can be altered by the system privilege(s) specified in the command.

ANS: F PTS: 1 REF: 201

15. The PASSWORD EXPIRE option can be used to force a user to change his or her password at the time of the next login.

ANS: T PTS: 1 REF: 202-203

16. A role can only be granted to other roles.

ANS: F PTS: 1 REF: 204

17. Even if a set of privileges

You May Also Find These Documents Helpful

  • Satisfactory Essays

    I was unable to use Password as the password because it doesn’t meet the password policy requirements.…

    • 96 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    • Manager – user/users group with access rights to change all database information, including database ACL, replication and local encryption settings;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    The exception to this would be if the permissions on /bar were changed to a more strict setting. These settings will be able to manage access to resources for network and local users.…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    It’s imperative that proper user/groups structures are established. Every user will be a member of the group however; every user won’t be an owner of a group. The owner can change attributes and grant access to files within the group they own.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    When we take a look at the access control list some users have a R by their name which means that they are able to only read the file that they are associated with. Some users with have a W which means that they will be able to actually write and make changes to the file. Some users will have a X which means that they can execute the file. In order to add users to a group a manager, or the company 's system administrator would have to go in and assign individual users to each group.…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Easement Research Paper

    • 368 Words
    • 2 Pages

    3. GRANTOR hereby grants to GRANTEE the right to permit the GRANTEE, GRANTEE’S invitees, guests and others of the general public coming on the premises to utilize the Easement, it being the intention of the parties hereto that such persons shall have free access to, upon and over the Easement for ingress and egress purposes. (Encumbrance Clause)…

    • 368 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    8. What is the PASS_MAX_DAYS setting? Why is it good to set this? Max days to change your password. This is a great idea to force people to change passwords and if they don’t then the account goes bye bye.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Answer: It is a strategy meant to discourage unauthorized people from guessing names and passwords to gain access to the system.…

    • 679 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Truman Show

    • 360 Words
    • 1 Page

    benefit the person with power. This is done indirectly, and is usually done without the person…

    • 360 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Because this is a Self-Service page, in order to test, our user needs to be associated with a person. In addition our user needs the grants associated with the iExpenses functions. Therefore we need to edit user FWKTESTER and associate with a person (Pat Stock), and add the iExpenses responsibility.…

    • 1989 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    A System Administrator has access to Password maintenance and to see Submit and Authorise claim screens.…

    • 539 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Basic Linux Command

    • 359 Words
    • 6 Pages

    Command's Purpose Linux Basic Linux Example Copies files cp cp thisfile.txt /home/thisdirectory Moves files mv mv thisfile.txt /home/thisdirectory Lists files ls ls (all information ls –l) Clears screen clear clear Closes prompt window exit exit Displays or sets date date date Deletes files rm rm thisfile.txt "Echoes" output on the screen echo echo this message Edits files with simple text editor vi vi thisfile.txt Compares the contents of files diff diff file1 file2 Finds a string of text in a file grep grep this word or phrase thisfile.txt Formats a diskette mke2fs (or mformat /sbin/mke2fs /dev/ fd0 (/dev/fd0 is the Linux equivalent of A:) Displays command help man man command Creates a directory…

    • 359 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    enrollment system

    • 318 Words
    • 1 Page

    The term "Login" means the combination of unique username and password that is used to access our Service. A login is a license to use a site, application or service for a period of time that is specified.…

    • 318 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    5. Now click on "Advanced" and Navigate to "owner" tab on the Advanced Security Option.…

    • 720 Words
    • 3 Pages
    Good Essays

Related Topics