What are the three ways in which Oracle Authorization Policy Manager may be used to
create and administer data security policies?
A.
one or more actions (such as view, edit, or delete) performed on database records that
correspond to the operations supported by the business object, and which may include
custom operations
B.
a role that has been provisioned with the users who can perform all actions without grant
C.
a role that has been provisioned with the users who can perform the granted actions
D.
a database resource that references a foreign key corresponding to the database table or
view of the business object to be secured
E.
a rule (also known as a condition) to define the available row instances in the form of a
SQL predicate or simple filler (stored as XML) defined on the rows of the database resource