Which statement is true about security rules for Database Deployments?

Which statement is true about security rules for Database Deployments?
A. They are used only for configuring external server access to Database Deployments and do not impact how network groups communicate.
B. They define a specific communication path, which consists of a source, destination, and protocol-port combination over which communication is allowed.
C. They are used to map an external user to a database user to allow the user to communicate with and access the database.
D. They are used to encrypt communication between Database Deployments.

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.