网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
How would you grant the RVPC user access to specific RMAN database records in the RMAN virtual private catalog?()
A

 Issue the grant command from the SYS user (or equivalent) of the target database.

B

 Issue the grant command from the SYS user (or equivalent) of the recovery-catalog database.

C

 Issue the grant command from the recovery catalog-owning schema user account in the recovery catalog.

D

 Issue the grant command from RMAN when connected to the recovery catalog-owning schema.

E

 Issue the grant command from RMAN when connected to the target database.


参考答案

参考解析
解析: 暂无解析
更多 “单选题How would you grant the RVPC user access to specific RMAN database records in the RMAN virtual private catalog?()A  Issue the grant command from the SYS user (or equivalent) of the target database.B  Issue the grant command from the SYS user (or equivalent) of the recovery-catalog database.C  Issue the grant command from the recovery catalog-owning schema user account in the recovery catalog.D  Issue the grant command from RMAN when connected to the recovery catalog-owning schema.E  Issue the grant command from RMAN when connected to the target database.” 相关考题
考题 You are trying to deploy a configuration job to an ios access point using the wlse, but the job fails. Which of the following would cause this failure?()A、snmp communitiesB、telnet/ssh user/passwordC、wlccp credentialsD、http user/password

考题 How can you verify that you have correctly configured SSH access to your Junos device?()A、user@router# show system servicesB、user@router show configuration servicesC、user@router# show configuration system servicesD、user@router# show system login

考题 While creating a scheduler window using the DBMS_SCHEDULER package, a user logged in as DBMGR gets the error message insufficient privileges.  Which two commands would you use to resolve this error?()A、GRANT dba TO dbmgr;B、GRANT connect TO dbmgr;C、GRANT resource TO dbmgr;D、GRANT hs_admin_role TO dbmgr;E、GRANT manage scheduler TO dbmgr;

考题 The RVPC user can do which of the following?()A、 Register databases if granted the register database privilegeB、 See all databases in the recovery-catalog schemaC、 See all database-related metadata in the recovery catalog if they are granted access to that databaseD、 Unregister databases from the RVPC catalog that were not granted to the RVPC catalog owner with  the grant commandE、 Not be connected to with the RMAN command-line catalog parameter for backup or recovery purposes

考题 The user SCOTT who is the owner of ORDERS and ORDERJTEMS tables issues the following  GRANT command:  GRANT ALL   ON orders, order_items   TO PUBLIC;   What correction needs to be done to the above statement? ()A、 PUBLIC should be replaced with specific usernames.B、 ALL should be replaced with a list of specific privileges.C、 WITH GRANT OPTION should be added to the statement.D、 Separate GRANT statements are required for ORDERS and ORDERJTEMS tables.

考题 Your company hires 10 new employees. You want the new employees to connect to the main office through a VPN connection. You create new user accounts and grant the new employees the Allow Read and Allow Execute permissions to shared resources in the main office. The new employees are unable to access shared resources in the main office. You need to ensure that users are able to establish a VPN connection to the main office What should you do()A、Grant the new employees the Allow Full control permission.B、Grant the new employees the Allow Access Dial-in permission.C、Add the new employees to the Remote Desktop Users security group.D、Add the new employees to the Windows Authorization Access security group.

考题 Which of the following protocols would BEST grant the user secure access to a remote location?()A、VPNB、FTPC、POP3D、DNS

考题 How would you grant the RVPC user access to specific RMAN database records in the RMAN virtual private catalog?()  A、 Issue the grant command from the SYS user (or equivalent) of the target database.B、 Issue the grant command from the SYS user (or equivalent) of the recovery-catalog database.C、 Issue the grant command from the recovery catalog-owning schema user account in the recovery catalog.D、 Issue the grant command from RMAN when connected to the recovery catalog-owning schema.E、 Issue the grant command from RMAN when connected to the target database.

考题 It is a holiday and no transactions are being performed on the database. You took a consistent backup of your database without using Recovery Manager (RMAN). How would you make use of this consistent backup in RMAN?()A、cannot be used in RMANB、by starting up the database againC、by using the CATALOG command of RMAND、by using the RECOVER CATALOG command in RMANE、by re-creating the target control file to rebuild the RMAN repository

考题 You are creating a recovery catalog for use with RMAN. You have issued these commands: SQL CREATE TABLESPACE rman_ts DATAFILE  ’/DISK1/rman_ts01.dbf’ 2 SIZE 20M 3 DEFAULT STORAGE (initial 100K next 100K pctincrease 0); SQL CREATE USER rman_db01 IDENTIFIED BY rman_db01 2 DEFAULT TABLESPACE rman_ts 3 QUOTA unlimited ON rman_ts;  Which command should you issue next?()A、RESYNC CATALOG;B、REGISTER DATABASE;C、CREATE CATALOG TABLESPACE rman_ts;D、GRANT recovery_catalog_owner TO rman_db01;

考题 You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository.  Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()A、 rman TARGET / NOCATALOGB、 rman TARGET sys/passwordC、 rman TARGET sys/password AS SYSDBAD、 rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat

考题 You are maintaining your database in Oracle10g. You find that the INDEXES index tablespace should be recovered. How will you recover the index tablespace?()A、 by using the Flashback Database featureB、 by using RMAN incomplete recoveryC、 by performing a user-managed incomplete recoveryD、 by dropping and re-creating the index tablespace

考题 You are managing a database for which incremental backups can be very time consuming. In order to perform optimized incremental backups you enable the block change tracking feature.How would you instruct RMAN to use the block change tracking feature when performing incremental backups?()A、 You need to mention it with every BACKUP command.B、 The block change tracking feature is used automatically by RMAN.C、 You need to configure it using the CONFIGURE command.D、 You need to set the necessary initialization parameters to direct RMAN to use the feature.

考题 Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You have a stand-alone server that serves as a Stand-alone root certification authority (CA). You need to ensure that a specific user can back up the CA and configure the audit parameters on the CA.  What should you do?()A、 Assign the user account to the CA Admin role.B、 Add the user account to the local Administrators group.C、 Grant the user the Back up files and directories user right.D、 Grant the user the Manage auditing and security log user right.

考题 You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files.D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on. 

考题 You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?() A、Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account. B、Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account. C、Grant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. D、Grant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. 

考题 You need to design the database permissions for access from the terminals to the database server. Which action or actions should you perform?()A、Create a database role named BankTerminals.B、Grant the BankTerminals role the Execute permission for the WoodgroveBanking database.C、Grant database access to the Windows Bank Terminals group, and add the group to the BankTerminals role.D、Grant the BankTerminals role the Execute permission for the Bank schema.E、Grant the Windows Bank Terminals group the Execute permission for the Bank schema.F、Grant the BankTerminals role the Execute permission for all stored procedures and user-defined functions in the Bank schema.

考题 单选题You are trying to deploy a configuration job to an IOS access point using the WLSE, but the jobfails. Which of the following would cause this failure?()A SNMP communitiesB Telnet/SSH user/passwordC WLCCP credentialsD HTTP user/password

考题 单选题You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository.  Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()A  rman TARGET / NOCATALOGB  rman TARGET sys/passwordC  rman TARGET sys/password AS SYSDBAD  rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat

考题 单选题You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?()A Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account. B Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account. C Grant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. D Grant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. 

考题 单选题A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()A Configure roles based on departments and assign access based on source IP address.B Configure roles based on the user's manager and assign access based on the user's MAC addressC Configure roles based on group memberships and assign a specific VLAN to the role.D Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.

考题 单选题A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()A Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.B Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.C Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.D Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.

考题 多选题You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()ACreate a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.BConfigure a wired adapter and assign the required SSID under User Roles Agent Odyssey Settings.CCreate a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.DCreate a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.

考题 单选题Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You have a stand-alone server that serves as a Stand-alone root certification authority (CA). You need to ensure that a specific user can back up the CA and configure the audit parameters on the CA.  What should you do?()A  Assign the user account to the CA Admin role.B  Add the user account to the local Administrators group.C  Grant the user the Back up files and directories user right.D  Grant the user the Manage auditing and security log user right.

考题 单选题You are the DBA for an academic database. You need to create a role that allows a group of users to modify existing rows in the STUDENT_GRADES table. Which set of statements accomplishes this? ()A CREATE ROLL registrar; GRANT MODIFY ON student_grant TO registrar; GRANT registrar to user 1, user2, user3B CREATE NEW ROLE registrar; GRANT ALL ON student_grant TO registrar; GRANT registrar to user 1, user2, user3C CREATE ROLL registrar; GRANT UPDATE ON student_grant TO registrar; GRANT ROLE to user1, user2, user3D CREATE ROLL registrar; GRANT UPDATE ON student_grant TO registrar; GRANT registrar to user 1, user2, user3;E CREATE registrar; GRANT CHANGE ON student_grant TO registrar; GRANT registrar;

考题 多选题A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()APerform a policy trace for the specific user and review the output to isolate the problem.BReview the Events log.CReview the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.DReview the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.

考题 单选题It is a holiday and no transactions are being performed on the database. You took a consistent backup of your database without using Recovery Manager (RMAN). How would you make use of this consistent backup in RMAN?()A cannot be used in RMANB by starting up the database againC by using the CATALOG command of RMAND by using the RECOVER CATALOG command in RMANE by re-creating the target control file to rebuild the RMAN repository