Anyone who knows just the host name and the listener name can have full control over the listener. They can stop the listener and also obtain detailed information about the listener, database, and the configuration of the application. How would you avoid this scenario?()
- Alock the listener
- Bhide the listener
- Ccreate multiple listeners
- Drun listener on a remote client
- Eset a password for the listener
- Fstore listener.ora in a non-default locatio