网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You use—login-path to access a MySQL server on a Linux installation. Which statement is true about the – login-path option that is created by using mysql_config_editor?()
A

All system users have access to the MySQL server via—login path local

B

login-path can be used only for MySQL servers running on a local machine

C

login-path allows you to provide login credentials without passing clear text passwords on the command line

D

When using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later


参考答案

参考解析
解析: 暂无解析
更多 “单选题You use—login-path to access a MySQL server on a Linux installation. Which statement is true about the – login-path option that is created by using mysql_config_editor?()A All system users have access to the MySQL server via—login path localB login-path can be used only for MySQL servers running on a local machineC login-path allows you to provide login credentials without passing clear text passwords on the command lineD When using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later” 相关考题
考题 You use—login-path to access a MySQL server on a Linux installation.Which statement is true about the – login-path option that is created by using mysql_config_editor?() A.All system users have access to the MySQL server via—login path localB.login-path can be used only for MySQL servers running on a local machineC.login-path allows you to provide login credentials without passing clear text passwords on the command lineD.When using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later

考题 You have a login-path named adamlocal that was created by using the mysql_config_editor command. You need to check what is defined for this login_path to ensure that it is correct for you deployment.You execute this command:$mysql_config_editor print –login-path=adamlocal What is the expected output of this command?()A.The command prints all parameter for the login-path. The password is replaced with starsB.The command prints the encrypted entry for the login-path. The is only possible to see if an entry existsC.The command prints all parameters for the login-path. The password is shown only when you provide the –password optionD.The command prints all parameters for the login-path. The password is printed in plain tex

考题 You are the network administrator for your company. All network servers run Windows Server 2003. Business hours are 8 A.M. to 5 P.M. You provide network assistance during business hours only.A server named Server1 stores personal files for all network users. Mobile users access Server1 by using the company‘s VPN. They must have 24-hour access to the files on Server1.You need to be able to identify the source of the recurring slowdowns in VPN access.First, you log on to Server1.What should you do next?()A. Use Task Manager to review network utilization of the VPN adapter.B. Use the Performance console to create a log of network utilization outside of business hours.C. Use System Monitor to review network utilization of the VPN connection.D. Use Task Manager to select Bytes Sent as the Network Adapter History setting.

考题 Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You run Remote Desktop Services and Microsoft Virtual Desktop Infrastructure (VDI). You have the servers shown in the following table. Name Server role Server1 RD Session Host Server2 RD Virtualization Host Server3 RD Connection Broker Server4 RD Web Access You are configuring Remote Desktop Web Access (RD Web Access) to publish VDI desktops and remote applications on the RD Web Access server. You need to ensure that when remote users log on to the RD Web Access server they are presented with all remote applications and only their assigned VDI desktop. Which two actions should you perform on Server4?()A、Set the source name to Server3.B、Set the source name to Server1;Server2.C、Select the option to use to one or more RemoteApp sources.D、Select the option to use a Remote Desktop Connection Broker server as the source.

考题 A new employee needs access to a SQL Server 2005 database that is located on a server named SQL1. You create a login named ajones by using the following Transact-SQL statement. CREATE LOGIN ajones WITH PASSWORD = ’SQLServer$1’ The new employee reports that when he logs in, he receives the following error message: "Login failed. The user is not associated with a trusted SQL Server connection." You need to resolve the error and allow the new employee to gain access to SQL1. What should you do?()A、Change the SQL Server security mode from Windows Authentication mode to SQL Server and Windows authentication mode.B、Change the SQL Server security mode from SQL Server and Windows Authentication mode to Windows authentication mode.C、Ensure that the login name is created with square brackets ([]).D、Give the login access to a specific database by using the CREATE USER Transact-SQL statement.

考题 You use—login-path to access a MySQL server on a Linux installation. Which statement is true about the – login-path option that is created by using mysql_config_editor?()A、All system users have access to the MySQL server via—login path localB、login-path can be used only for MySQL servers running on a local machineC、login-path allows you to provide login credentials without passing clear text passwords on the command lineD、When using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later

考题 You install a copy of Mysql 5.6.13 on a brand new Linux server by using RPM packages. The server starts successfully as verified by the following commands: $ pidof mysqld 3132 $tail – n2 /var/lib.mysql/hostname.err 2013-08-18 08:18:38 3132 [Note] /usr/sbin/mysqld:ready for connections. Version: '5.6.13-enterprise-commercial-advaced' socket:'/tmp/mysql.sock' port; 3306 Mysql Enterprise Server – Advanced Edition (Commercial) You attempt to log in as the root user with the following command: $mysql – u root ERROR 1045 (28000): Access denied for user 'root'@'localhost' (using password: NO) Which statement is true about this scenario?()A、The RPM installation script sets a default password of password for new installationsB、The local root user must log in with a blank password initially: mysql –u root –pC、New security measures mean that the mysql_secure_installation script must be run first on all new installationsD、The mysql_install_bd post-installation script used – random-password

考题 You have a login-path named "adamlocal" that was created by using the mysql_config_editor command. You need to check what is defined for this login_path to ensure that it is correct for you deployment. You execute this command: $mysql_config_editor print –login-path=adamlocal What is the expected output of this command?()A、The command prints all parameter for the login-path. The password is replaced with starsB、The command prints the encrypted entry for the login-path. The is only possible to see if an entry existsC、The command prints all parameters for the login-path. The password is shown only when you provide the –password optionD、The command prints all parameters for the login-path. The password is printed in plain tex

考题 You work as an administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of a single domain named ENSUREPASS.com. All servers on the ENSUREPASS.com network have Windows Server 2012 installed. You are in the process of installing a Server Core installation of Windows Server 2012 on a new ENSUREPASS.com server, named ENSUREPASS-SR13.  Which of the following is TRUE with regards to a installing a Server Core installation of Windows Server 2012?()A、The Server Graphical Shell is installed, but not enabledB、Server roles can be configured locally via the command prompt using Windows PowerShell.C、Server roles can be configured locally via Server ManagerD、You are able to access the Microsoft Management Console locallyE、The Desktop Experience is not available

考题 Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You run Remote Desktop Services and Microsoft Virtual Desktop Infrastructure (VDI). You have the serve rs shown in the following table. You are configuring Remote Desktop Web Access (RD Web Access) to publish VDI desktops and r emote applications on the RD Web Access server. You need to ensure that when remote users log on to the RD Web Access server they are presented with all remote applications and only their assigned VDI desktop. Which two actions should you perform on Server 4?()A、Set the source name to Server3.B、Set the source name to Server1;Server2.C、Select the option to use to one or more RemoteApp sources.D、Select the option to use a Remote Desktop Connect ion Broker server as the source.

考题 You are the administrator of an Active Directory domain. All servers run Windows Server 2003.  You configure a server named Server3 as the DNS server for the domain.The company recently started using a new ISP. Since the change to the new ISP occurred, users report that they cannot access Internet Web sites by using their fully qualified domain names (FQDNs).You manually configure a test computer to use the DNS server address of the new ISP. The test computer can successfully access Internet Web sites by using their FQDNs.You need to ensure that network users can access Internet Web sites by using their FQDNs, while ensuring that user access to internal resources is not disrupted.   What are two possible ways to achieve this goal?()A、Create a root zone on Server3.B、Configure Server3 to use the default root hints.C、Configure a forwarder on Server3 to the new ISP’s DNS server.D、Configure all computers on your network to use the new ISP’s DNS server.

考题 You have an Exchange Server 2007 organization.All users on your network run Microsoft Office Outlook 2007 to access their mailboxes.Outlook 2007 is configured to connect by using RPC over HTTP and Auto discover. You perform a Typical installation of Exchange Server 2010 on a new server, and then move mailboxes to the new server.Users now report that they cannot access their mailboxes.You need to ensure that all users can access their mailboxes. What should you do from the new server?()A、Select the Switchover Server option.B、Enable and configure Outlook Anywhere.C、Create and configure a Client Access array.D、Rename the OWA virtual directory to Exchange.

考题 You have an Exchange Server 2010 organization.Users on the network use HTTPS to connect to Outlook Web App (OWA).The Client Access server uses a certificate issued by an internal certification authority (CA).You plan to deploy an e-mail encryption solution for all users. You need to ensure that users can send and receive encrypted e-mail messages by using S/MIME from OWA.What should you do?()A、Issue a certificate to each userB、Instruct all OWA users to import a root CA certificateC、Modify the authentication settings of the OWA virtual directoryD、Configure the Client Access Server to use a certificate issued by a third-party CA

考题 Your network contains an Active Directory domain. You have a server that runs Windows Server 2008 R2 and has the Remote Desktop Services server role enabled. All client computers run Windows 7. You need to plan the deployment of a new line-of-business application to all client computers. The  deployment must meet the following requirements:   èUsers must access the application from an icon on their desktops.   èUsers must have access to the application when they are not connected to the network. What should you do?()A、Publish the application as a RemoteApp.B、Publish the application by using Remote Desktop Web Access (RD Web Access).C、Assign the application to the Remote Desktop Services server by using a Group Policy object (GPO).D、Assign the application to all client computers by using a Group Policy object (GPO).

考题 You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.Company.com has its headquarters in Paris where you are located.you are responsible for managing two exchange servers named -ex01 and -ex02.both exchange servers are configured to host the client access server role, the hub transport server role as well as the mailbox server role.terstkingex01 and -ex02 are members of a database availability group.during the course of the week you receive an instruction from management to ensure that users are able to make a connection to the client access server in the event of a single server failure. What should you do?()A、Your best option would be to have the Network Load Balancing feature installed on every server.Thereafter a second IP address should be assigned to every network adapter.B、Your best option would be to have two new records created for the Client Access server from the DNS manager.C、Your best option would be to have a hardware load balancer deployed. Then a DNS record should be created for the virtual IP address. Thereafter a Client Access server array should be configured.D、Your best option would e to have a new service named Client Access Server created and a new IP address allocated from the Failover Cluster Manager.

考题 Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. You have a Remote Desktop Session Host (RD Session Host) server and a Remote Desktop Web Access (RD Web Access) server. You enable several RemoteApp applications on the RD Session Host server. You need to configure access to RemoteApp applications so that RD Web Access users see only applications to which they have been granted access. What should you do?()A、Use the RemoteApp Wizard to add to the RemoteApp Programs list setting.B、Assign domain users and domain security groups to each RemoteApp application.C、Use the RemoteApp Wizard to configure the RemoteApp program is available through RD Web Access setting.D、Specify custom menu locations on the RD Session Host server for each domain security group by using a Group Policy object (GPO).

考题 单选题You install a copy of Mysql 5.6.13 on a brand new Linux server by using RPM packages. The server starts successfully as verified by the following commands: $ pidof mysqld 3132 $tail – n2 /var/lib.mysql/hostname.err 2013-08-18 08:18:38 3132 [Note] /usr/sbin/mysqld:ready for connections. Version: '5.6.13-enterprise-commercial-advaced' socket:'/tmp/mysql.sock' port; 3306 Mysql Enterprise Server – Advanced Edition (Commercial) You attempt to log in as the root user with the following command: $mysql – u root ERROR 1045 (28000): Access denied for user 'root'@'localhost' (using password: NO) Which statement is true about this scenario?()A The RPM installation script sets a default password of password for new installationsB The local root user must log in with a blank password initially: mysql –u root –pC New security measures mean that the mysql_secure_installation script must be run first on all new installationsD The mysql_install_bd post-installation script used – random-password

考题 多选题A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()ADisabling connections from named pipes or socket files (depending on the operating system of the server)BEnabling and using SSL for connections to the Mysql databaseCInstalling Mysql on the application server, and running the database and application on the same serverDStarting the server with – bind- address=0.0.0.0 specifiedERunning the server with – skip-networking specifiedFLimiting logins to originate from the application server or the server's subnet'

考题 单选题You have forgotten the root user account password. You decide to reset the password and execute the following: Shell> /etc/init.d/mysql stop Shell> /etc/init.d/mysql start – skip-grant tables Which additional argument makes this operation safer?()A –skip-networking, to prohibit access from remote locationsB –reset-grant-tables, to start the server with only the mysql database accessibleC –read-only,to set all data to read-only except for super usersD –old-passwords, to start Mysql to use the old password format while running without the grant tables

考题 单选题You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.Company.com has its headquarters in Paris where you are located.you are responsible for managing two exchange servers named -ex01 and -ex02.both exchange servers are configured to host the client access server role, the hub transport server role as well as the mailbox server role.terstkingex01 and -ex02 are members of a database availability group.during the course of the week you receive an instruction from management to ensure that users are able to make a connection to the client access server in the event of a single server failure. What should you do?()A Your best option would be to have the Network Load Balancing feature installed on every server.Thereafter a second IP address should be assigned to every network adapter.B Your best option would be to have two new records created for the Client Access server from the DNS manager.C Your best option would be to have a hardware load balancer deployed. Then a DNS record should be created for the virtual IP address. Thereafter a Client Access server array should be configured.D Your best option would e to have a new service named Client Access Server created and a new IP address allocated from the Failover Cluster Manager.

考题 单选题Your network contains an Active Directory domain. You have a server that runs Windows Server 2008 R2 and has the Remote Desktop Services server role enabled. All client computers run Windows 7. You need to plan the deployment of a new line-of-business application to all client computers. The  deployment must meet the following requirements:   èUsers must access the application from an icon on their desktops.   èUsers must have access to the application when they are not connected to the network. What should you do?()A Publish the application as a RemoteApp.B Publish the application by using Remote Desktop Web Access (RD Web Access).C Assign the application to the Remote Desktop Services server by using a Group Policy object (GPO).D Assign the application to all client computers by using a Group Policy object (GPO).

考题 单选题You have a login-path named "adamlocal" that was created by using the mysql_config_editor command. You need to check what is defined for this login_path to ensure that it is correct for you deployment. You execute this command: $mysql_config_editor print –login-path=adamlocal What is the expected output of this command?()A The command prints all parameter for the login-path. The password is replaced with starsB The command prints the encrypted entry for the login-path. The is only possible to see if an entry existsC The command prints all parameters for the login-path. The password is shown only when you provide the –password optionD The command prints all parameters for the login-path. The password is printed in plain tex

考题 单选题You are a Windows Server 2008 systems administrator responsible for configuring FTP Publishing Servicefor use by members of your organization’s engineering department. The name of the server is FTPServer01. Several users have reported that they are able to access most files through the FTP site,but they cannot access the contents of the Drawings folder. You have verified that these users. Windowsaccounts have the correct file system permissions for this folder. You want to minimize the permissionsgranted to all the users. Which of the following changes should you make to enable users to access thisfolder?()A Change the permissions for the IUSR_FTPServer01 account on the Drawings folder.B Create new TCP/IP Address Restrictions entries for the users who cannot access the Drawings folder.C Disable the Allow Only Anonymous Connections option.D Add the users to the local Administrators group on FTPServer02.

考题 单选题A new employee needs access to a SQL Server 2005 database that is located on a server named SQL1. You create a login named ajones by using the following Transact-SQL statement. CREATE LOGIN ajones WITH PASSWORD = ’SQLServer$1’ The new employee reports that when he logs in, he receives the following error message: "Login failed. The user is not associated with a trusted SQL Server connection." You need to resolve the error and allow the new employee to gain access to SQL1. What should you do?()A Change the SQL Server security mode from Windows Authentication mode to SQL Server and Windows authentication mode.B Change the SQL Server security mode from SQL Server and Windows Authentication mode to Windows authentication mode.C Ensure that the login name is created with square brackets ([]).D Give the login access to a specific database by using the CREATE USER Transact-SQL statement.

考题 单选题You use—login-path to access a MySQL server on a Linux installation. Which statement is true about the – login-path option that is created by using mysql_config_editor?()A All system users have access to the MySQL server via—login path localB login-path can be used only for MySQL servers running on a local machineC login-path allows you to provide login credentials without passing clear text passwords on the command lineD When using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later

考题 单选题You have an Exchange Server 2007 organization.All users on your network run Microsoft Office Outlook 2007 to access their mailboxes.Outlook 2007 is configured to connect by using RPC over HTTP and Auto discover. You perform a Typical installation of Exchange Server 2010 on a new server, and then move mailboxes to the new server.Users now report that they cannot access their mailboxes.You need to ensure that all users can access their mailboxes. What should you do from the new server?()A Select the Switchover Server option.B Enable and configure Outlook Anywhere.C Create and configure a Client Access array.D Rename the OWA virtual directory to Exchange.

考题 单选题You have an Exchange Server 2010 organization.Users on the network use HTTPS to connect to Outlook Web App (OWA).The Client Access server uses a certificate issued by an internal certification authority (CA).You plan to deploy an e-mail encryption solution for all users. You need to ensure that users can send and receive encrypted e-mail messages by using S/MIME from OWA.What should you do?()A Issue a certificate to each userB Instruct all OWA users to import a root CA certificateC Modify the authentication settings of the OWA virtual directoryD Configure the Client Access Server to use a certificate issued by a third-party CA