Which method would you use to restrict enabling of such roles?

You want to create a role to meet these requirements:
1. The role is to be protected from unauthorized usage.
2. The password of the role is not to be embedded in the application source code or stored in a
table.
Which method would you use to restrict enabling of such roles?

You want to create a role to meet these requirements:
1. The role is to be protected from unauthorized usage.
2. The password of the role is not to be embedded in the application source code or stored in a
table.
Which method would you use to restrict enabling of such roles?

A.
Create the role with external authentication.

B.
Create the role as a secure application role.

C.
Create the role as a password-protected role.

D.
Create a role and use Fine-Grained Access Control (FGAC) to secure the role.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Google

Google

Here are some of the internet sites we advise for our visitors.