网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
In order to enable remote administration of users and tablespaces on an Oracle database, which of the following types of files must exist in the database?()
A

Password file 

B

Initialization file 

C

Datafile 

D

Control file 

E

Nothing - SYSDBA privileges are not required for these actions


参考答案

参考解析
解析: 暂无解析
更多 “单选题In order to enable remote administration of users and tablespaces on an Oracle database, which of the following types of files must exist in the database?()A Password file B Initialization file C Datafile D Control file E Nothing - SYSDBA privileges are not required for these actions” 相关考题
考题 Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?() A. Disable TELNETB. Disable IGMP snoopingC. Enable TELNET but not SSLD. Disable ICMP/ping on device

考题 You are the network administrator for All servers run Windows Server 2003.You manage a server named Testking2. IIS is installed on Testking2. Testking2 hosts TestKing‘s public Web site.You need to configure Testking2 to allow remote administration of all Web sites. In addition, you must be able to view the system and application event logs remotely.The remote administration must be done by using a Web browser. The procedure for remote administration must be encrypted.What should you do?()A. Enable Remote Desktop.B. Install the Remote Administration (HTML) Windows component.C. Install the Remote Desktop Web Connection Windows component.D. Configure the startup type of the Telnet service to Automatic and start the Telnet service.

考题 You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.You want to minimize changes to your security model and to your database applications. How should you modify the database?A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.

考题 Why is it appropriate to use conditional label advertising when deploying MPLS? ()A、to make CEF tables smallerB、to enable label switching on the frame mode interfaceC、to restrict MPLS availability to predefined time periodsD、to restrict label switching to a limited number of networksE、to restrict end users from seeing the routers in the MPLS network

考题 ou executed the command to create a password file in the database server: $ orapwd file=orapworcl entries=5 ignorecase=N  Which statement describes the purpose of the above password file()A、It records usernames and passwords of users when granted the DBA role.B、It contains usernames and passwords of users for whom auditing is enabled.C、It is used by Oracle to authenticate users for remote database administration.D、It records usernames and passwords of all users when they are added to OSDBA or OSOPER operating system groups.

考题 Which of the following is true regarding NetWare Directory Services (NDS) configuration?()A、Remote users can access the tree through dial-in connections.B、Mobile users do not require changing the NDS name context.C、Remote users do not require a special NDS object entry.D、There are no differences between mobile users and remote users.

考题 5520 AMS GUI上,导航至管理树(Administration Tree)中,选择EMS管理(EMS Administration)→用户管理(User Management)→用户(Users),要禁用用户超时限制,将闲置注销超时(Inactivity Logout Timeout)参数设置为()。A、启用(Enable)B、无闲置超时(No Inactivity Timeout)C、用户定义(User Defined)D、禁用(DISABLE)

考题 Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()A、Disable TELNETB、Disable IGMP snoopingC、Enable TELNET but not SSLD、Disable ICMP/ping on device

考题 You have been recently hired as a database administrator. Your senior manager asks you to study the production database server and submit a report on the settings done by the previous DBA.  While observing the server settings, you find that the following parameter has been set in the parameter file of the database:  REMOTE_OS_AUTHENT = TRUE  What could have been the reason to set this parameter as TRUE?()A、to enable operating system authentication for a remote clientB、to restrict the scope of administration to identical operating systemsC、to allow the start up and shut down of the database from a remote clientD、to enable the administration of the operating system from a remote clientE、to disable the administration of the operating system from a remote client

考题 In order to enable remote administration of users and tablespaces on an Oracle database, which of the following types of files must exist in the database?()A、Password file B、Initialization file C、Datafile D、Control file E、Nothing - SYSDBA privileges are not required for these actions

考题 You need to connect to your computer by using the Remote Desktop Connection client.  Which two actions should you perform?()A、Enable Remote Desktop in the System Properties dialog box.B、Enable Remote Assistance in the System Properties dialog box.C、Enable the Remote Desktop exception in Microsoft Windows Firewall.D、Enable the Remote Assistance exception in Microsoft Windows Firewall.E、Enable the Remote Administration exception in Windows Firewall.

考题 You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

考题 You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. The company has many remote users One of the servers on the network calledServer01 has the Terminal Services Gateway (TS Gateway) role installed on it. The remote users of thecompany need to connect remotely to desktop computers located in their offices through the gateway. Toensure secure connection to the gateway, you created a security group named RemoteUsersGrp1 for theremote users who need to connect to computers in their offices. Which of the following options would youchoose to enable the remote users to connect to the TS Gateway? ()A、Create a resource authorization policy.B、Create a client authorization policy.C、Create a Group Policy object enable the Set TS Gateway authentication method properties to Ask forcredentials,use Basic protocol.D、Add the RemoteUsersGrp1 security group and enable Device redirection.

考题 You need to identify which tool the help desk users must use to perform administrative tasks.  Which tool should you identify?()A、RemoteAppB、Remote AssistanceC、Remote DesktopD、Remote Server Administration Tools (RSAT)

考题 Your network contains several Windows Server 2008 R2 servers that run Windows Server Update   Services (WSUS). The WSUS servers distribute updates to all computers on the internal network. Remote users connect from their personal computers to the internal network by using a split-tunnel VPN  connection.   You need to plan a strategy for patch management that deploys updates on the remote users coputers.   Your strategy must meet the following requirements: èMinimize bandwidth use over the VPN connections.   èRequire updates to be approved on the WSUS servers before they are installed on the client computers. What should you include in your plan?()A、Create a Group Policy object (GPO) to perform client-side targeting.B、 Create a computer group for the remote users¯ computers. Configure the remote user computers touse the internal WSUS server.C、Create a custom connection by using the Connection Manager Administration Kit (CMAK). Deploy the  custom connection to all of the remote users computersD、Deploy an additional WSUS server. Configure the remote userscomputers to use the additional WSUS server. Configure the additional WSUS server to leave the updates on the Microsoft Update Web  site.

考题 Your company runs Remote Desktop Services. All client computers run Windows XP SP3. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that users c an print by using Easy Print while connected to the RD Session Host server. What should you do on the client computers?()A、Install .NET Framework 3.5.B、Enable Network Level Authentication (NLA)C、Enable a Windows Firewall Inbound Rule for File and Printer Sharing.D、Enable a Windows Firewall Outbound Rule for File and Printer Sharing.

考题 You have a server that runs the Terminal Services Gateway (TS Gateway) role service. Users need to connect remotely through the gateway to desktop computers located in their offices.  You create a security group named Remote1 for the users who need to connect to computers in their offices.  You need to enable the users to connect to the TS Gateway. What should you do?()A、Add the Remote1 security group to the local remote desktop users group on the TS Gateway server.B、Create a client authorization policy. Add the Remote1 security group and enable Device redirection.C、Create a resource authorization policy. Add the Remote1 security group and enable Users to connect to any resource.D、Create a Group Policy object and enable the Set TS Gateway authentication method properties to Ask for credentials, use Basic protocol. Apply the policy to the TS Gateway server.

考题 Your network contains two servers that run the Server Core installation of Windows Server 2008 R2.  The two servers are part of a Network Load Balancing cluster. The cluster hosts a Web site.  Administrators use client computers that run Windows 7.   You need to recommend a strategy that allows the administrators to remotely manage the Network Load  Balancing cluster. Your strategy must support automation.  What should you recommend?()A、On the servers, enable Windows Remote Management (WinRM).B、On the servers, add the administrators to the Remote Desktop Users group.C、On the Windows 7 client computers,enable Windows Remote Management (WinRM).D、On the Windows 7 client computers,add the administrators to the Remote Desktop Users group.

考题 Which of the following options allows for the remote administration of a Core installation of  Windows Server 2012 R2 from another server running Windows Server 2012 R2?()A、Configure Router Guard.B、Configure Port Mirroring.C、Enable Remote Management.D、Enable Remote Desktop.E、Using Server Manager.

考题 You receive a remote assistance request. It expires before you are able to accept it. You need to increase the amount of time you have to accept remote assistance requests.  What should you do?()A、Decrease the account lockout duration in the local security policy.B、Temporarily enable the Remote Administration exception in Microsoft Windows Firewall.C、Set the maximum amount of time an invitation can remain open to 12 hours.D、Enable the Remote Desktop (less secure) option and add yourself to the Remote Desktop Users group.

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named All 40 network servers run Windows Server 2003, and all 1,500 client computers run Windows XP Professional. The servers are located in seven different buildings. All are configured to allow Remote Desktop connections. A new administrator named Tess King is hired to help you configure applications and perform disk defragmentation on all 40 servers. You need to enable Tess King to manage the servers remotely by using Remote Desktop for Administration. What should you do?()A Add Tess King to the Administrators group.B Add Tess King to the Power Users group.C Add Tess King to the Remote Desktop Users group.D Delegate control of the Domain Controllers organizational unit (OU) to Tess King.E Delegate control of the Computers organizational unit (OU) to Tess King.

考题 单选题In order to enable remote administration of users and tablespaces on an Oracle database, which of the following types of files must exist in the database?()A Password file B Initialization file C Datafile D Control file E Nothing - SYSDBA privileges are not required for these actions

考题 单选题You have been recently hired as a database administrator. Your senior manager asks you to study the production database server and submit a report on the settings done by the previous DBA.  While observing the server settings, you find that the following parameter has been set in the parameter file of the database:  REMOTE_OS_AUTHENT = TRUE  What could have been the reason to set this parameter as TRUE?()A to enable operating system authentication for a remote clientB to restrict the scope of administration to identical operating systemsC to allow the start up and shut down of the database from a remote clientD to enable the administration of the operating system from a remote clientE to disable the administration of the operating system from a remote client

考题 单选题You install Windows Server 2008 R2 (Server Core Installation) on a server. You need to be able to remotely manage storage on the server by using Disk Manager. What should you do?()A Install the Microsoft Remote Server Administration Tools (RSAT).B Use the DISKPART utility to run the attributes volume clear readonly command for each volume.C Run the netsh advfirewall Firewall set rule group=Remote Administration new enable=yes command.D Run the netsh advfirewall Firewall set rule group=Remote Volume Management new enable=yes command.

考题 单选题ou executed the command to create a password file in the database server: $ orapwd file=orapworcl entries=5 ignorecase=N  Which statement describes the purpose of the above password file()A It records usernames and passwords of users when granted the DBA role.B It contains usernames and passwords of users for whom auditing is enabled.C It is used by Oracle to authenticate users for remote database administration.D It records usernames and passwords of all users when they are added to OSDBA or OSOPER operating system groups.

考题 单选题You are an enterprise administrator for Cer-tech .com. The corporate network of the company consists ofan Active Directory domain. All the servers on the network run Windows Server 2008. The network runsTerminal services to enable remote users to run commonly required applications from their terminal. Anorganizational unit (OU) called TermSerUsers have been configured for the standard users who connect tothe Terminal Server and an OU called TermSerAdmin is configured for the administrative users. Besidesthese two types of users, no other user can connect to the Terminal Server. Which of the following optionswould you choose to ensure that only members of the TermSerAdmin OU can run the Remote DesktopProtocol files?()A Create a GPO and disabled the Allow .rdp files from unknown publishers policy setting in the RemoteDesktop Client Connection template. Apply the GPO to the TermSerUsers OU.B Create a GPO and enable the Allow .rdp files from valid publishers and users default.rdp settingspolicy setting in the Remote Desktop Client Connection template. Apply the GPO to the TermSerUsersOU.C Create a GPO and enable the Allow .rdp files from valid publishers and users default.rdp settingspolicy setting in the Remote Desktop Client Connection template. Apply the GPO to the TermSerAdminOU.D Create a GPO and enable the Specify SHA1 thumbprints of certificates representing trusted.rdppublishers policy setting in the Remote Desktop Client Connection template. Apply the GPO to theTermSerAdmin OU.

考题 单选题You receive a remote assistance request. It expires before you are able to accept it. You need to increase the amount of time you have to accept remote assistance requests.  What should you do?()A Decrease the account lockout duration in the local security policy.B Temporarily enable the Remote Administration exception in Microsoft Windows Firewall.C Set the maximum amount of time an invitation can remain open to 12 hours.D Enable the Remote Desktop (less secure) option and add yourself to the Remote Desktop Users group.

考题 单选题You are the network administrator for All servers run Windows Server 2003. You manage a server named Testking2. IIS is installed on Testking2. Testking2 hosts TestKing's public Web site. You need to configure Testking2 to allow remote administration of all Web sites. In addition, you must be able to view the system and application event logs remotely. The remote administration must be done by using a Web browser. The procedure for remote administration must be encrypted. What should you do?()A Enable Remote Desktop.B Install the Remote Administration (HTML) Windows component.C Install the Remote Desktop Web Connection Windows component.D Configure the startup type of the Telnet service to Automatic and start the Telnet service.