RelationalDBDesign
SiteMap
Network Config
Network Admin
Network Topology
Serverside Configuration
«Prev
Next»
Network Topology
Oracle Certification
Networking Overview
History Oracle Networking
Evolution Network Protocols
Oracle Networked Computers
DB Evolution
Distributed Data
Distributed DB Features
Local Autonomy
Fragmentation Independence
Oracle Topology Overview
DB Links Connectivity
Join Tables Remote Sites
TNS
Inter Communication
SQL App Connection
SQL Handles Connections
SQL Net Version 1
SQL Net Enhancements
Distributed DB Connectivity
Networking Conclusion
Net Services Architecture
Net Parameter Files
Network Component Tools
Components Functions tnsnames.ora
protocol.ora File
TCP.NODELAY option
sqlnet.ora File Location
Sqlnet ora File Characteristics
sqlnet.ora-log
Net Communications Process Level
Create Oracle DBlink
Database Link Connection
SQLnet Architecture Conclusion
ServerSide Configuration
sqlnet Client/Server Components
Listener Manages Oracle Connection
Configuring Oracle Listener
Oracle Net Assistant
Net Assistant Naming Methods
Route Client connection Requests
Set TNS Timeout Value
Setting Listener Password
lsnrctl Listener control Utility
Start listener using lsnrctl
Stop Listener via lsnrctl
Setting Up Protocol Listeners
Client side Configuration
Windows Client Architecture
NET Configuration Assistant
Running Oracle Installer
Starting Oracle Listener - Exercise
Describe the functions of the listener
Objective:
Understand the internal functions of the listener.
Exercise scoring
This exercise is worth a total of 10 points. To receive full credit, you should be able to explain in nontechnical terms (plain English), the security options available for controlling the Oracle Net environment. Your answer should be understandable to a manager who knows nothing about Oracle or Oracle Net.
Background
Imagine that you have been approached by the security manager of your shop, who wants to ensure that the listener remains running and that unauthorized personnel are not allowed to perform listener functions.
Instructions
Complete the following steps:
Explain, in the form of a short paragraph, how the listener functions can be protected within Oracle and UNIX.
Type the Oracle commands that are used to enforce security.
Identify the UNIX files that require protection, and type the UNIX commands that are used to protect these files.
Submitting the exercise
Type or paste the answers to the questions above into the text box beneath each question. Then click the
Submit
button below to submit your answers and view a results page. Remember that you must submit all your responses to this exercise at once.
Submit