Examine the following steps of privilege analysis for checking and revoking excessive,
unused privileges granted to users:
1. Create a policy to capture the privileges used by a user for privilege analysis.
2. Generate a report with the data captured for a specified privilege capture.
3.Start analyzing the data captured by the policy.
4.Revoke the unused privileges.
5. Compare the used and unused privileges’ lists.
6. Stop analyzing the data.
Identify the correct sequence of steps.
A.
1, 3, 5, 6, 2, 4
B.
1, 3, 6, 2, 5, 4
C.
1, 3, 2, 5, 6, 4
D.
1, 3, 5, 2, 6, 4
Explanation:
1. Create a policy to capture the privilege used by a user for privilege analysis.
3. Start analyzing the data captured by the policy.
6. Stop analyzing the data.
2. Generate a report with the data captured for a specified privilege capture.
5. Compare the used and unused privileges’ lists.
4. Revoke the unused privileges.
B
B
B. Not tested but it seem to be correct.
B.
https://oracle-base.com/articles/12c/capture-privilege-usage-12cr1
Right, it is B:
https://docs.oracle.com/database/121/DVADM/priv_analysis.htm#DVADM1013
Its C
How Can You
Stop analyzing the data
before
generating capture report ?
C.
1, 3, 2, 5, 6, 4
1. Create a policy to capture the privileges used by a user for privilege analysis.
3. Start analyzing the data CAPTURED by the policy.
2. Generate a report with the data CAPTURED for a specified privilege capture.
5. Compare the used and unused privileges’ lists.
6. Stop analyzing the data.
4. Revoke the unused privileges.
B