Question No 2
You are designing and developing a complex database application and implementing finegrained
access control using security policies.Which statement is true with respect to attaching security policies to database objects?
A.You can use different security policies for SELECT, INSERT, UPDATE, INDEX and DELETE statements.
B. You can use only one security policy per database object.
C. You implement security policies through database procedures.
D. Column-masking policies can be applied to SELECT, INSERT, UPDATE and DELETE statements.
Answer: D
No comments:
Post a Comment