网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()
A

All users except SYS

B

All users except SCOTT

C

All users except sys and SCOTT

D

All users except sys, system, and SCOTT


参考答案

参考解析
解析: 暂无解析
更多 “单选题You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A All users except SYSB All users except SCOTTC All users except sys and SCOTTD All users except sys, system, and SCOTT” 相关考题
考题 You enabled an audit policy by issuing the following statements:SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT;SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM;For which database users and for which executions is the audit policy now active? ()A. SYS, SYSTEMB. SCOTTC. Only for successful executionsD. Only for failed executionsE. Both successful and failed executions

考题 You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements:SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT;For which database users is the audit policy now active?()A. All users except SYSB. All users except SCOTTC. All users except sys and SCOTTD. All users except sys, system, and SCOTT

考题 Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()A、 Configure a directory service access audit policy. Increase the maximum size of the security log.B、 Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C、 Configure an object access audit policy for the directory. Increase the maximum size of the system log.D、 Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

考题 You have a computer that runs Windows 7. You need to record when an incoming connection is allowedthrough Windows firewall. What should you do?()A、In Local Group Policy, modify the audit policy.B、In Local Group Policy, modify the system audit policy.C、From the Windows Firewall with Advanced Security properties, set the logging settings to Log successfulconnections.D、From the Windows Firewall with Advanced Security properties, set the Data Protection (Quick Mode)IPSec settings to Advanced.

考题 You enabled an audit policy by issuing the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT; SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM; For which database users and for which executions is the audit policy now active? ()A、SYS, SYSTEMB、SCOTTC、Only for successful executionsD、Only for failed executionsE、Both successful and failed executions

考题 You execute the following commands to audit database activities: SQL ALTER SYSTEM SET AUDIT_TRIAL=DB, EXTENDED SCOPE=SPFILE; SQL AUDIT SELECT TABLE, INSERT TABLE, DELETE TABLE BY JOHN By SESSION WHENEVER SUCCESSFUL; Which statement is true about the audit record that generated when auditing after instance restarts?()A、One audit record is created for every successful execution of a SELECT, INSERT OR DELETE command on a table, and contains the SQL text for the SQL Statements.B、One audit record is created for every successful execution of a SELECT, INSERT OR DELETE command, and contains the execution plan for the SQL statements.C、One audit record is created for the whole session if john successfully executes a SELECT, INSERT, or DELETE command, and contains the execution plan for the SQL statements.D、One audit record is created for the whole session if JOHN successfully executes a select command, and contains the SQL text and bind variables used.E、One audit record is created for the whole session if john successfully executes a SELECT, INSERT,or DELETE command on a table, and contains the execution plan, SQL text, and bind variables used.

考题 You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A、All users except SYSB、All users except SCOTTC、All users except sys and SCOTTD、All users except sys, system, and SCOTT

考题 Your network contains an Active Directory domain. All servers run Windows Server 2008 R2.     You need to audit the deletion of registry keys on each server.     What should you do()A、From Audit Policy, modify the Object Access settings and the Process Tracking settings.B、From Audit Policy, modify the System Events settings and the Privilege Use settings.C、From Advanced Audit Policy Configuration, modify the System settings and the Detailed Tracking settings.D、From Advanced Audit Policy Configuration, modify the Object Access settings and the Global Object Access Auditin

考题 You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 35 Windows Server 2003 computers; 3,000 Windows XP Professional computers; and 2,200 Windows 2000 Professional computers.  The written company security policy states that all computers in the domain must be examined, with the following goals:  (1)to find out whether all available security updates are present   (2)to find out whether shared folders are present  to record the file system type on each hard disk   You need to provide this security assessment of every computer and verify that the requirementsof the written security policy are met.  What should you do?()A、Open the Default Domain Policy and enable the Configure Automatic Updates policy.B、Open the Default Domain Policy and enable the Audit object access policy, the Audit account management policy, and the Audit system events policy.C、On a server, install and run mbsacli.exe with the appropriate configuration switches.D、On a server, install and run HFNetChk.exe with the appropriate configuration switches.

考题 Your network consists of a single Active Directory domain. All domain controllers run Windows  Server 2008 R2.     The Audit account management policy setting and Audit directory services access setting are  enabled for the entire domain.     You need to ensure that changes made to Active Directory objects can be logged. The logged  changes must include the old and new values of any attributes.     What should you do()A、Enable the Audit account management policy in the Default Domain Controller Policy.B、Run auditpol.exe and then configure the Security settings of the Domain Controllers OU.C、Run auditpol.exe and then enable the Audit directory service access setting in the Default Domain policy.D、From the Default Domain Controllers policy, enable the Audit directory service access setting and enable directory

考题 Your network contains an Active Directory domain named contoso.com. All domain controllers  and member servers run Windows Server 2008. All client computer run Windows 7.  From a client computer, you create an audit policy by using the Advanced Audit Policy  Configuration settings in the Default Domain Policy Group Policy object (GPO).   You discover that the audit policy is not applied to the member servers.    The audit policy is  applied to the client computers.   You need to ensure that the audit policy is applied to all member servers and all client computers.     What should you do()A、Add a WMI filter to the Default Domain Policy GPOB、Modify the security settings of the Default Domain Policy GPOC、Configure a startup script that runs auditpol.exe on the member servers.D、Configure a startup script that runs auditpol.exe on the domain controllers.

考题 Your network contains an Active Directory domain. All servers run Windows Server 2008 R2.   You need to audit the deletion of registry keys on each server.   What should you do()A、From Audit Policy, modify the Object Access settings and the Process Tracking settings.B、From Audit Policy, modify the System Events settings and the Privilege Use settings.C、From Advanced Audit Policy Configuration, modify the System settings and the Detailed Tracking  settings.D、From Advanced Audit Policy Configuration, modify the Object Access settings and the Global Object  Access Auditing settings.

考题 Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 The Audit account management policy setting and Audit directory services access setting are enabled for the entire domain. You need to ensure that changes made to Active Directory objects can be logged. The logged changes must include the old and new values of any attributes What should you do()A、Enable the Audit account management policy in the Default Domain Controller Policy.B、Run auditpol.exe and then configure the Security settings of the Domain Controllers OU.C、Run auditpol.exe and then enable the Audit directory service access setting in the Default Domain policy.D、From the Default Domain Controllers policy, enable the Audit directory service access setting andE、nable directory service changes.

考题 You are the administrator of a SQL Server 2005 computer named SQL1. SQL1 is a member of a Microsoft Active Directory domain. You do not have any rights or privileges to perform domain administration. However, you have been granted membership in the local Administrators group on SQL1. You perform most of the management of SQL1 from your administrative workstation. However, for security reasons, you want to track all attempts for interactive logons and network connections to SQL1. What should you do?()A、Create a Group Policy object (GPO) that is configured for success and failure auditing of the Audit account logon events setting. Ask the domain administrator to link the GPO to the object containing SQL1.B、Configure the SQL Server service on SQL1 to audit all successful and failed logon attempts.C、Edit the local security policy of SQL1. Then, configure success and failure auditing on the Audit logon events setting.D、Run the SQL Server Profiler and use a standard default template.

考题 Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()A、In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.B、In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.C、In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.D、In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.

考题 单选题You execute the following commands to audit database activities: SQL ALTER SYSTEM SET AUDIT_TRIAL=DB, EXTENDED SCOPE=SPFILE; SQL AUDIT SELECT TABLE, INSERT TABLE, DELETE TABLE BY JOHN By SESSION WHENEVER SUCCESSFUL; Which statement is true about the audit record that generated when auditing after instance restarts?()A One audit record is created for every successful execution of a SELECT, INSERT OR DELETE command on a table, and contains the SQL text for the SQL Statements.B One audit record is created for every successful execution of a SELECT, INSERT OR DELETE command, and contains the execution plan for the SQL statements.C One audit record is created for the whole session if john successfully executes a SELECT, INSERT, or DELETE command, and contains the execution plan for the SQL statements.D One audit record is created for the whole session if JOHN successfully executes a select command, and contains the SQL text and bind variables used.E One audit record is created for the whole session if john successfully executes a SELECT, INSERT,or DELETE command on a table, and contains the execution plan, SQL text, and bind variables used.

考题 单选题Your network contains an Active Directory domain named contoso.com. All domain controllers  and member servers run Windows Server 2008. All client computer run Windows 7.  From a client computer, you create an audit policy by using the Advanced Audit Policy  Configuration settings in the Default Domain Policy Group Policy object (GPO).   You discover that the audit policy is not applied to the member servers.    The audit policy is  applied to the client computers.   You need to ensure that the audit policy is applied to all member servers and all client computers.     What should you do()A Add a WMI filter to the Default Domain Policy GPOB Modify the security settings of the Default Domain Policy GPOC Configure a startup script that runs auditpol.exe on the member servers.D Configure a startup script that runs auditpol.exe on the domain controllers.

考题 单选题Your network contains an Active Directory domain. All servers run Windows Server 2008 R2.   You need to audit the deletion of registry keys on each server.   What should you do()A From Audit Policy, modify the Object Access settings and the Process Tracking settings.B From Audit Policy, modify the System Events settings and the Privilege Use settings.C From Advanced Audit Policy Configuration, modify the System settings and the Detailed Tracking  settings.D From Advanced Audit Policy Configuration, modify the Object Access settings and the Global Object  Access Auditing settings.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 35 Windows Server 2003 computers; 3,000 Windows XP Professional computers; and 2,200 Windows 2000 Professional computers.  The written company security policy states that all computers in the domain must be examined, with the following goals:  (1)to find out whether all available security updates are present   (2)to find out whether shared folders are present  to record the file system type on each hard disk   You need to provide this security assessment of every computer and verify that the requirementsof the written security policy are met.  What should you do?()A Open the Default Domain Policy and enable the Configure Automatic Updates policy.B Open the Default Domain Policy and enable the Audit object access policy, the Audit account management policy, and the Audit system events policy.C On a server, install and run mbsacli.exe with the appropriate configuration switches.D On a server, install and run HFNetChk.exe with the appropriate configuration switches.

考题 单选题Your network consists of a single Active Directory domain. All domain controllers run Windows Server  2008 R2.  The Audit account management policy setting and Audit directory services access setting are enabled for  the entire domain.  You need to ensure that changes made to Active Directory objects can be logged. The logged changes  must include the old and new values of any attributes.  What should you do()A Enable the Audit account management policy in the Default Domain Controller Policy.B Run auditpol.exe and then configure the Security settings of the Domain Controllers OU.C Run auditpol.exe and then enable the Audit directory service access setting in the Default Domain  policy.D From the Default Domain Controllers policy, enable the Audit directory service access setting and  enable directory service changes.

考题 单选题Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()A In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.B In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.C In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.D In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.

考题 单选题Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()A  Configure a directory service access audit policy. Increase the maximum size of the security log.B  Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C  Configure an object access audit policy for the directory. Increase the maximum size of the system log.D  Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

考题 多选题You enabled an audit policy by issuing the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT; SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM; For which database users and for which executions is the audit policy now active? ()ASYS, SYSTEMBSCOTTCOnly for successful executionsDOnly for failed executionsEBoth successful and failed executions

考题 单选题You are the administrator of a SQL Server 2005 computer named SQL1. SQL1 is a member of a Microsoft Active Directory domain. You do not have any rights or privileges to perform domain administration. However, you have been granted membership in the local Administrators group on SQL1. You perform most of the management of SQL1 from your administrative workstation. However, for security reasons, you want to track all attempts for interactive logons and network connections to SQL1. What should you do?()A Create a Group Policy object (GPO) that is configured for success and failure auditing of the Audit account logon events setting. Ask the domain administrator to link the GPO to the object containing SQL1.B Configure the SQL Server service on SQL1 to audit all successful and failed logon attempts.C Edit the local security policy of SQL1. Then, configure success and failure auditing on the Audit logon events setting.D Run the SQL Server Profiler and use a standard default template.

考题 单选题You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A All users except SYSB All users except SCOTTC All users except sys and SCOTTD All users except sys, system, and SCOTT

考题 单选题Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 The Audit account management policy setting and Audit directory services access setting are enabled for the entire domain. You need to ensure that changes made to Active Directory objects can be logged. The logged changes must include the old and new values of any attributes What should you do()A Enable the Audit account management policy in the Default Domain Controller Policy.B Run auditpol.exe and then configure the Security settings of the Domain Controllers OU.C Run auditpol.exe and then enable the Audit directory service access setting in the Default Domain policy.D From the Default Domain Controllers policy, enable the Audit directory service access setting andE nable directory service changes.

考题 单选题Your network contains an Active Directory domain. All servers run Windows Server 2008 R2.     You need to audit the deletion of registry keys on each server.     What should you do()A From Audit Policy, modify the Object Access settings and the Process Tracking settings.B From Audit Policy, modify the System Events settings and the Privilege Use settings.C From Advanced Audit Policy Configuration, modify the System settings and the Detailed Tracking settings.D From Advanced Audit Policy Configuration, modify the Object Access settings and the Global Object Access Auditin