网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You want to enforce a company’s business policy on several objects by using a singlepolicy function.  Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective?()

  • A、DBMS_RLS.STATIC
  • B、DBMS_RLS.DYNAMIC
  • C、DBMS_RLS.SHARED_STATIC
  • D、DBMS_RLS.CONTEXT_SENSITIVE
  • E、DBMS_RLS.SHARED_CONTEXT_SENSITIVE

参考答案

更多 “ You want to enforce a company’s business policy on several objects by using a singlepolicy function.  Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective?()A、DBMS_RLS.STATICB、DBMS_RLS.DYNAMICC、DBMS_RLS.SHARED_STATICD、DBMS_RLS.CONTEXT_SENSITIVEE、DBMS_RLS.SHARED_CONTEXT_SENSITIVE” 相关考题
考题 Risk can be divided into two basic types; business risk and pure (or insurable risk). Of the following, which one(s) fall(s) under business risk?A liability lossB direct property lossC profit lossD personnel-related lossE B and C

考题 Which two statements apply to policy scheduling?() (Choose two.) A. An individual policy can have only one scheduler applied.B. You must manually configure system-time updates.C. Multiple policies can use the same scheduler.D. Policies that do not have schedulers are not active.

考题 Which two statements apply to policy scheduling?() (Choose two.)A、An individual policy can have only one scheduler applied.B、You must manually configure system-time updates.C、Multiple policies can use the same scheduler.D、Policies that do not have schedulers are not active.

考题 You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()A、 Delegate the password management controls to the help desk staff.B、 Delegate the password management controls to the Domain Users group.C、 Configure the Default Domain Policy to enforce password expiration settings.D、 Configure the Default Domain Controller Policy to enforce password expiration settings.

考题 Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A、 the business knowledge of the IT staffB、 the technical knowledge of the IT staffC、 the company’s business objectivesD、 the company’s network topologyE、 the IT future directions

考题 Which of the following are types of routine objects?()A、Package and functionB、Function and userexitC、Procedure and packageD、Function and procedure

考题 Which four types of objects can be thrown using the throw statement?()A、 ErrorB、 EventC、 ObjectD、 ExceptionE、 ThrowableF、 RuntimeException

考题 You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()A、Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.B、Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.C、Configure the Host Checker policy as a role restriction for the Employee role.D、Configure the Host Checker policy as a resource access policy for the Employee role.

考题 Which two statements are true with regard to policy ordering? ()(Choose two.)A、The last policy is the default policy, which allows all traffic.B、The order of policies is not important.C、New policies are placed at the end of the policy list.D、The insert command can be used to change the order.

考题 You work as a database administrator for Supportcenter.cn. You want to administer your database servers, which are running on different host machines, using the Web-enabled grid control interface. You have configured the agent on the host machines. You have started the Oracle Database 10g Grid Control utility on your machine. Which two additional components would you configure to achieve this objective?()A、Application Server ControlB、Oracle Management ServiceC、Oracle Enterprise Manager RepositoryD、Oracle Enterprise Manager Database Control

考题 Which two chart base types can you select using the Chart Wizard?()A、Line B、Column C、Bubble D、Flowchart E、OHLC candle stock

考题 You want to migrate your application from the development environment to the production environment. While doing the task, you want the database objects owned by the user DEVUSER in the development environment to be moved to the user APPS in the production environment. Which option of Oracle Data Pump Import would you use to achieve this objective?()A、ownerB、touserC、includeD、schemasE、fromuserF、transformG、remap_schemaH、remap_datafileI、reuse_datafilesJ、remap_tablespace

考题 You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()A、 DBMS_RLS.STATICB、 DBMS_RLS.DYNAMICC、 DBMS_RLS.SHARED_STATICD、 DBMS_RLS.CONTEXT_SENSITIVEE、 DBMS_RLS.SHARED_CONTEXT_SENSITIVE

考题 You are the network administrator for Humongous Insurance. The network consists of a single Active Directory domain named humongous.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure several Group Policy objects (GPOs) to enforce the use of IPSec for certain types of communication between specified computers.   A server named Server2 runs the Telnet service. A GPO is supposed to ensure that all Telnet connections to Server2 are encrypted by using IPSec. However, when you monitor network traffic, you notice that Telnet connections are not being encrypted.You need to view all of the IPSec settings that are applied to Server2 by GPOs. Which tool should you use?()A、the IP Security Policy Management consoleB、the IP Security Monitor consoleC、the Resultant Set of Policy consoleD、Microsoft Baseline Security Analyzer (MBSA)

考题 You are adatabase solutions architect.Your company plans to develop asolution by using a SQLServer 2008 instance. The solutionhas the following business requirements: Import datafromvarious datasources suchas MicrosoftOffice Excel, Microsoft SQL Server2000, Microsoft SQL Server 2005, and CSV files. Profile the source data before it is imported. Provide collaboration andoffline capabilities to mobile users. Allowmobile users to use heterogeneous data stores. You need to configure the appropriate SQL Server components to accomplish the business requirements. You want to achieve this goal by using the minimum amount of administrative effort. Which two SQL Server components should you use?()A、Analysis ServicesB、Reporting ServicesC、Integration ServicesD、Notification ServicesE、Microsoft Sync Framework

考题 You are designing for implementing Group Policy objects (GPOs) to meet the business and technical requirement. What should you do?()A、Create one new GPO to enforce software restriction policies. Link this GPO to the domain.B、Create one new GPO to enforce software restriction policies. Link this GPO to the appropriate  organizational unit (OU).C、Create one new GPO to enforce software restriction policies. Link this GPO to all organizational units (OUs).D、Create new GPOs to match the number of organizational units (OUs).configure these GPOs to enforce software restriction policies. Link this GPO to its respective OU.

考题 Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to select a digital certificate for signing Remote Desktop Protocol (.rdp) files. Which two certificate types can you use to achieve this goal?()A、Trusted third party SSL certificateB、Authenticated SessionC、Workstation AuthenticationD、Remote Desktop Protocol (RDP) Signing

考题 You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()A、msiB、mstC、zapD、zip

考题 Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to select a digita l certificate for signing Remote Desktop Protocol (.rdp) files. Which two certificate types can you use to achieve this goal?()A、Trusted third party SSL certificateB、Authenticated SessionC、Wo rkstation AuthenticationD、Remote Desktop Protocol (RDP) Signing

考题 You are the desktop administrator for your company's sales department. The IT manager for the sales department creates a custom policy that will apply to a custom application that is loaded on the department's Windows XP Professional computers. He deploys this policy by using Group Policy. When you inspect the sales department's computers, you find out that the application has not been modified by the policy. You want to examine Windows XP Professional to find out whether the custom policy is affecting the correct location in the Registry. Which command should you run?()A、Msinfo32. exeB、Gpresult.exeC、Gpedit.mscD、Rsop.msc

考题 单选题You want to migrate your application from the development environment to the production environment. While doing the task, you want the database objects owned by the user DEVUSER in the development environment to be moved to the user APPS in the production environment. Which option of Oracle Data Pump Import would you use to achieve this objective?()A ownerB touserC includeD schemasE fromuserF transformG remap_schemaH remap_datafileI reuse_datafilesJ remap_tablespace

考题 多选题Which two statements are true with regard to policy ordering? ()(Choose two.)AThe last policy is the default policy, which allows all traffic.BThe order of policies is not important.CNew policies are placed at the end of the policy list.DThe insert command can be used to change the order.

考题 多选题You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()ADBMS_RLS.STATICBDBMS_RLS.DYNAMICCDBMS_RLS.SHARED_STATICDDBMS_RLS.CONTEXT_SENSITIVEEDBMS_RLS.SHARED_CONTEXT_SENSITIVE

考题 单选题You are designing for implementing Group Policy objects (GPOs) to meet the business and technical requirement.  What should you do? ()A  Create one new GPO to enforce software restriction policies. Link this GPO to the domain.B  Create one new GPO to enforce software restriction policies. Link this GPO to the appropriate organizational unit (OU).C  Create one new GPO to enforce software restriction policies. Link this GPO to all organizational units (OUs).D  Create new GPOs to match the number of organizational units (OUs).configure these GPOs to enforce software restriction policies. Link this GPO to its respective OU.

考题 多选题Which four types of objects can be thrown using the throw statement?()AErrorBEventCObjectDExceptionEThrowableFRuntimeException

考题 多选题Which two chart base types can you select using the Chart Wizard?()ALineBColumnCBubbleDFlowchartEOHLC candle stock

考题 多选题You want to enforce a company’s business policy on several objects by using a singlepolicy function.  Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective?()ADBMS_RLS.STATICBDBMS_RLS.DYNAMICCDBMS_RLS.SHARED_STATICDDBMS_RLS.CONTEXT_SENSITIVEEDBMS_RLS.SHARED_CONTEXT_SENSITIVE