Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Create three (3) users (schema) as follows: User Password Other Parameters DBSEC_ADMIN inft6157admin Tablespace: USERS Temporary tablespace: TEMP DBSEC_CLERK inft6157clerk Same as above DBSEC_DEV inft6157$dev

Create three (3) users (schema) as follows: 

UserPasswordOther Parameters
DBSEC_ADMINinft6157admin

Tablespace: USERS
Temporary tablespace: TEMP

DBSEC_CLERKinft6157clerkSame as above
DBSEC_DEVinft6157$devSame as above

 

2. Create three profiles as specified in the following table:

 

 

 

 

ProfileResourcesPassword
DBSEC_ADMIN_PROFSESSIONS_PER_USER=5
CONNECT_TIME=8 hours
IDLE_TIME=1 hour
PASSWORD_LIFE_TIME= 1 month
PASSWORD_GRACE_TIME=7 days
DBSEC_DEV_PROFCONNECT_TIME=2 hours
IDLE_TIME=2 hours
CPU_PER_CALL=1 minute
PASSWORD_LIFE_TIME= 1 month
PASSWORD_GRACE_TIME=14 days
DBSEC_CLERK_PROFSESSIONS_PER_USER=1
CPU_PER_CALL=5 seconds
CONNECT_TIME=8 hours
IDLE_TIME=30 minutes
LOGICAL_READS_PER_CALL=100 Database Blocks
FAILED_LOGIN_ATTEMPTS=3
PASSWORD_LIFE_TIME= 1 month
PASSWORD_LOCK_TIME=3 days
PASSWORD_GRACE_TIME=14 days


 

 

3. Create roles with the following privileges: 

Role NamePrivileges
DBSEC_ADMIN_ROLESELECT and ALTER on all DBSEC tables
DBSEC_CLERK_ROLESELECT, INSERT, and UPDATE on all DBSEC tables
DBSEC_SUPERVISOR_ROLESELECT, INSERT, UPDATE and DELETE on all DBSEC tables
DBSEC_QUERY_ROLESELECT only on CUSTOMER table owned by DBSEC


 

4. Assign roles and profile to the users as in the following table: 

User NameRoleProfile
DBSEC_ADMINDBSEC_ADMIN_ROLEDBSEC_ADMIN_PROF
DBSEC_CLERKDBSEC_CLERK_ROLEDBSEC_CLERK_PROF
DBSEC_DEVDBSEC_ADMIN_ROLE plus DBSEC_SUPERVISOR_ROLEDBSEC_DEV_PROF


 

5. Connect as DBSEC_CLERK/inft6157clerk 

6. Perform a simple query on SUPPLIER table owned by DBSEC

Step by Step Solution

3.34 Rating (166 Votes )

There are 3 Steps involved in it

Step: 1

The question seems to be related to creating users profiles roles and performing certain operations in Oracle Database Here is how you need to perform ... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Principles Of Information Security

Authors: Michael E. Whitman, Herbert J. Mattord

7th Edition

035750643X, 978-0357506431

More Books

Students also viewed these Databases questions

Question

2. Establish eye-level position.

Answered: 1 week ago