Which statement is true about Network ACLs?
Examine this list:
1. You must monitor access to email column or salary column In the employees table.
2. If any activity is detected, the action must be audited and a notification sent out by email.
3. The database has Unified Auditing enabled.
4. You have created and successfully tested the email sending procedure, sysadmin_fga.emaii._ai.ert.
You create the audit policy:
A user with select privilege on hr.employees executes this :
SELECT email FROM HR.EMPLOYEES;
What will be the result?
Which two configurations can be used to protect sensitive data In a database?
Examine these commands and responses:
Which object privilege must be granted to allow execution of the stored procedure?