网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
A

The database user must be created using DB2 Control Center.

B

The database user must be created using the DB2 Command Line Processor.

C

The database user may be created using DB2 Control Center or DB2 Command Line Processor.

D

The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A The database user must be created using DB2 Control Center.B The database user must be created using the DB2 Command Line Processor.C The database user may be created using DB2 Control Center or DB2 Command Line Processor.D The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.” 相关考题
考题 In your multitenant container database (CDB) containing same pluggable databases (PDBs), you execute the following commands in the root container:Which two statements are true?() A. The C # # ROLE1 role is created in the root database and all the PDBs.B. The C # # ROLE1 role is created only in the root database because the container clause is not used.C. Privileges are granted to the C##A_ADMIN user only in the root database.D. Privileges are granted to the C##A_ADMIN user in the root database and all PDBs.E. The statement for granting a role to a user fails because the CONTAINER clause is not used.

考题 Examine the following impdp command to import a database over the network from a pre-12c Oracledatabase (source): Which three are prerequisites for successful execution of the command?() A. The import operation must be performed by a user on the target database with the DATAPUMP_IMP_FULL_DATABASE role, and the database link must connect to a user on the source database with the DATAPUMP_EXD_FULL_DATABASE role.B. All the user-defined tablespaces must be in read-only mode on the source database.C. The export dump file must be created before starting the import on the target database.D. The source and target database must be running on the same platform with the same endianness.E. The path of data files on the target database must be the same as that on the source database.F. The impdp operation must be performed by the same user that performed the expdp operation.

考题 Which of the following is a characteristic of a schema?() A.Foreign key references cannot cross schema boundaries.B.A DB2 user must be created before a schema with the same name can be created.C.If no schema is specified when an object is created, the default schema PUBLIC is used.D.A schema enables the creation of multiple objects in a database without encountering namespace collisions.

考题 Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?() A.REVOKE ACCESS ON DATABASE FROM USER bobB.REVOKE CONNECT ON DATABASE FROM USER tomC.REVOKE tom FROM ACCESS ON DATABASE BY USER bobD.REVOKE tom FROM CONNECT ON DATABASE BY USER bob

考题 Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、to add second factor based authentication to a Web applicationB、to pre-populate user wallets with all their application credentials in one goC、to enhance out-of-the-box audit logging by creating custom audit log eventsD、to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnE、to configure automatic password change on expiry for an application so that the new password is a random string of specified strength

考题 Which step do you need to perform to enable a user with the SYSDBA privilege to log in as SYSDBA in iSQL*Plus?()A、The user must be granted the database administrator (DBA) privilege.B、The user must be listed in the password file for the authentication.C、No special setup is needed for the user to connect as SYSDBA in iSQL*Plus.D、Set up a user in the Oracle Application Server Containers for J2EE (OC4J) user manager,and grant the webDba role to the user.

考题 In your database instance, the user sessions are connected to the database server from the remote machines.You want to achieve the following for these users: 1. The user account must be locked after four unsuccessful login attempts. 2. The user must be prompted to change the password at regular intervals. 3. The user may not have more than three simultaneous sessions. 4. The user session must automatically be logged off if more than 10 minutes elapsed time used. How would you accomplish the above()A、By assigning profiles for the usersB、By implementing Fine-Grained Auditing (FGA)C、By granting a secure application role to the usersD、By implementing the Database Resource Manager plan

考题 You are working on a 24X7 database. You want to design a backup strategy for your database that uses user managed backups. You want to be able to perform all backups while the database remains online. Which statement about performing user-managed backups in a 24x7 environment is true?()A、You must have change tracking enabled in your databaseB、Your database must be running in NOARCHIVELOG modeC、To back up a tablespace, it must be in backup modeD、To back up a tablespace, it must first be taken offline

考题 You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()A、The user cannot use the role at all.B、The role would not be granted to the user.C、The user needs to enable the role explicitly.D、The user can start using the role immediately.E、The user would have the admin option for the role.

考题 Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、The database user must be created using DB2 Control Center.B、The database user must be created using the DB2 Command Line Processor.C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

考题 What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()A、The directory must exist with one subdirectory (general).B、The directory must exist with two subdirectories (daily, weekly).C、The directory must exist with three subdirectories (daily, weekly, monthly).D、The directory must exist with four subdirectories (general, daily, weekly, monthly).

考题 Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A、REVOKE ACCESS ON DATABASE FROM USER bobB、REVOKE CONNECT ON DATABASE FROM USER tomC、REVOKE tom FROM ACCESS ON DATABASE BY USER bobD、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

考题 The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()A、The user would not be able to log in to the wallet.B、The user is able to log in with their wallet password, but the wallet is not synchronized with the server.C、A user must be re-assigned to another policy template in order to change any aspects of the applied policy.D、The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

考题 Which statement is true about the database and database-user used during installation of IMS Server?()A、A preexisting database user may be used but a new database has to be created during installation.B、A preexisting database may be used but a new database user has to be created during installation.C、A preexisting database and user may be used or a new database and user are created during installation.D、A preexisting database and user cannot be used; a new database and user are created during  installation.

考题 Which of the following is a characteristic of a schema?()A、Foreign key references cannot cross schema boundaries.B、A DB2 user must be created before a schema with the same name can be created.C、If no schema is specified when an object is created, the default schema PUBLIC is used.D、A schema enables the creation of multiple objects in a database without encountering namespace collisions.

考题 In your database instance, the user sessions are connected to the database server from the remotemachines. You want to achieve the following for these users:  1:The user account must be locked after four unsuccessful login attempts.PASSWORD_LOCK_TIME  2:The user must be prompted to change the password at regular intervals.PASSWORD_LIFE_TIME  3:The user may not have more than three simultaneous sessions.SESSIONS_PER_USER  4:The user session must automatically be logged off if more than 10 minutes elapsed time used.CONNECT_TIME  How would you accomplish the above()A、by assigning profiles for the usersB、by implementing Fine-Grained Auditing (FGA)C、by granting a secure application role to the usersD、by implementing the Database Resource Manager plan

考题 单选题Which step do you need to perform to enable a user with the SYSDBA privilege to log in as SYSDBA in iSQL*Plus?()A The user must be granted the database administrator (DBA) privilege.B The user must be listed in the password file for the authentication.C No special setup is needed for the user to connect as SYSDBA in iSQL*Plus.D Set up a user in the Oracle Application Server Containers for J2EE (OC4J) user manager,and grant the webDba role to the user.

考题 单选题Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A REVOKE ACCESS ON DATABASE FROM USER bobB REVOKE CONNECT ON DATABASE FROM USER tomC REVOKE tom FROM ACCESS ON DATABASE BY USER bobD REVOKE tom FROM CONNECT ON DATABASE BY USER bob

考题 单选题In your database instance, the user sessions are connected to the database server from the remote machines.You want to achieve the following for these users: 1. The user account must be locked after four unsuccessful login attempts. 2. The user must be prompted to change the password at regular intervals. 3. The user may not have more than three simultaneous sessions. 4. The user session must automatically be logged off if more than 10 minutes elapsed time used. How would you accomplish the above()A By assigning profiles for the usersB By implementing Fine-Grained Auditing (FGA)C By granting a secure application role to the usersD By implementing the Database Resource Manager plan

考题 单选题In your database instance, the user sessions are connected to the database server from the remotemachines. You want to achieve the following for these users:  1:The user account must be locked after four unsuccessful login attempts.PASSWORD_LOCK_TIME  2:The user must be prompted to change the password at regular intervals.PASSWORD_LIFE_TIME  3:The user may not have more than three simultaneous sessions.SESSIONS_PER_USER  4:The user session must automatically be logged off if more than 10 minutes elapsed time used.CONNECT_TIME  How would you accomplish the above()A by assigning profiles for the usersB by implementing Fine-Grained Auditing (FGA)C by granting a secure application role to the usersD by implementing the Database Resource Manager plan

考题 单选题You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()A The user cannot use the role at all.B The role would not be granted to the user.C The user needs to enable the role explicitly.D The user can start using the role immediately.E The user would have the admin option for the role.

考题 单选题What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()A The directory must exist with one subdirectory (general).B The directory must exist with two subdirectories (daily, weekly).C The directory must exist with three subdirectories (daily, weekly, monthly).D The directory must exist with four subdirectories (general, daily, weekly, monthly).

考题 单选题Which statement is true about the database and database-user used during installation of IMS Server?()A A preexisting database user may be used but a new database has to be created during installation.B A preexisting database may be used but a new database user has to be created during installation.C A preexisting database and user may be used or a new database and user are created during installation.D A preexisting database and user cannot be used; a new database and user are created during  installation.

考题 单选题You are working on a 24X7 database. You want to design a backup strategy for your database that uses user managed backups. You want to be able to perform all backups while the database remains online. Which statement about performing user-managed backups in a 24x7 environment is true?()A You must have change tracking enabled in your databaseB Your database must be running in NOARCHIVELOG modeC To back up a tablespace, it must be in backup modeD To back up a tablespace, it must first be taken offline

考题 单选题Which of the following is a characteristic of a schema?()A Foreign key references cannot cross schema boundaries.B A DB2 user must be created before a schema with the same name can be created.C If no schema is specified when an object is created, the default schema PUBLIC is used.D A schema enables the creation of multiple objects in a database without encountering namespace collisions.

考题 单选题The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()A The user would not be able to log in to the wallet.B The user is able to log in with their wallet password, but the wallet is not synchronized with the server.C A user must be re-assigned to another policy template in order to change any aspects of the applied policy.D The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

考题 多选题Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()Ato add second factor based authentication to a Web applicationBto pre-populate user wallets with all their application credentials in one goCto enhance out-of-the-box audit logging by creating custom audit log eventsDto create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnEto configure automatic password change on expiry for an application so that the new password is a random string of specified strength