OCP(11g)------> SEC_PROTOCOL_ERROR_FURTHER_ACTION
SEC_PROTOCOL_ERROR_FURTHER_ACTION
Property | Description |
---|---|
Parameter type | String |
Syntax | SEC_PROTOCOL_ERROR_FURTHER_ACTION = { CONTINUE | (DELAY,integer) | (DROP,integer) } |
Default value | CONTINUE |
Modifiable | ALTER SESSION, ALTER SYSTEM |
Basic | No |
SEC_PROTOCOL_ERROR_FURTHER_ACTION specifies the further execution of a server process when receiving bad packets from a possibly malicious client.
Values:
-
CONTINUE
The server process continues execution. The database server may be subject to a Denial of Service (DoS) if bad packets continue to be sent by a malicious client.伺服器程式繼續執行。如果壞包繼續是一個惡意的客戶端傳送 資料庫伺服器可能會受到拒絕服務(DoS)(DELAY,integer) -
The client experiences a delay of integer seconds before the server process accepts the next request from the same client connection. Malicious clients are prevented from excessive consumption of server resources while legitimate clients experience a degradation in performance but can continue to function.客戶體驗延遲整數秒之後伺服器程式接收來自同一客戶端連線下一個請求。防止惡意使用者的伺服器資源的過度消耗而合法的客戶體驗效能退化而能繼續功能。
-
(DROP,integer)
The server forcefully terminates the client connection after integer bad packets. The server protects itself at the expense of the client (for example, a client transaction may be lost). The client may reconnect and attempt the same operation.強行終止伺服器的客戶端連線後,整壞包。 客戶端可以連線並執行相同的操作。相關考題:To control the execution of a server process when it is receiving bad packets from a potentially maliciousclient, you set the SEC_PROTOCOL_ERROR_FURTHER_ACTION initialization parameter as follows:SQL> ALTER SYSTEM SET SEC_PROTOCOL_ERROR_FURTHER_ACTION = Drop,10;What is the significance of this setting?A. It terminates the client connection after 10 bad packets and the client cannot reconnect to the sameinstance.B. It terminates the client connection after 10 bad packets but the client can still reconnect, and attempt thesame operation again.C. It terminates the client connection 10 seconds after receiving a bad packet and the client cannotreconnect to the same instance.D. It terminates the client connection after receiving a bad packet and the client can reconnect to the sameinstance after 10 minutes.Answer: B
來自 “ ITPUB部落格 ” ,連結:http://blog.itpub.net/28602568/viewspace-759533/,如需轉載,請註明出處,否則將追究法律責任。
相關文章
- 【OCP】Oracle 11g OCP 1Z0-051 003Oracle
- 【OCP】Oracle 11g OCP 1Z0-051 004Oracle
- 【OCP】Oracle 11g OCP 1Z0-051 005Oracle
- 【OCP】Oracle 11g OCP 1Z0-051 006Oracle
- 【OCP】Oracle 11g OCP 1Z0-051 007Oracle
- 【OCP】Oracle 11g OCP 1Z0-051 001Oracle
- 【OCP】Oracle 11g OCP 1Z0-051 002Oracle
- Oracle?認證專家 (OCP) 11GOracle
- 11g oracle OCP 047題庫解析Oracle
- 11G oracle OCP 047題庫解析Oracle
- Oracle 11G OCP 1Z0-052 14Oracle
- Oracle 11G OCP 1Z0-052 88Oracle
- Oracle 11G OCP 1Z0-052 89Oracle
- Oracle 11G OCP 1Z0-052 90Oracle
- Oracle 11G OCP 1Z0-052 92Oracle
- Oracle 11G OCP 1Z0-052 93Oracle
- Oracle 11G OCP 1Z0-052 94Oracle
- Oracle 11G OCP 1Z0-052 95Oracle
- Oracle 11G OCP 1Z0-052 96Oracle
- Oracle 11G OCP 1Z0-052 97Oracle
- Oracle 11G OCP 1Z0-052 98Oracle
- Oracle 11G OCP 1Z0-052 99Oracle
- Oracle 11G OCP 1Z0-052 71Oracle
- Oracle 11G OCP 1Z0-052 73Oracle
- Oracle 11G OCP 1Z0-052 74Oracle
- Oracle 11G OCP 1Z0-052 75Oracle
- Oracle 11G OCP 1Z0-052 76Oracle
- Oracle 11G OCP 1Z0-052 77Oracle
- Oracle 11G OCP 1Z0-052 78Oracle
- Oracle 11G OCP 1Z0-052 79Oracle
- Oracle 11G OCP 1Z0-052 80Oracle
- Oracle 11G OCP 1Z0-052 81Oracle
- Oracle 11G OCP 1Z0-052 82Oracle
- Oracle 11G OCP 1Z0-052 83Oracle
- Oracle 11G OCP 1Z0-052 84Oracle
- Oracle 11G OCP 1Z0-052 85Oracle
- Oracle 11G OCP 1Z0-052 87Oracle
- Oracle 11G OCP 1Z0-052 53Oracle