网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()
A

the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor group

B

the user can see all the users except those in the Admin group, but can only modify the user’s own account

C

the user can see only the user’s own account, and cannot modify it

D

the user can see only the user’s own account, and can change the password only


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()A the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor groupB the user can see all the users except those in the Admin group, but can only modify the user’s own accountC the user can see only the user’s own account, and cannot modify itD the user can see only the user’s own account, and can change the password only” 相关考题
考题 You are the administrator of a Windows Server 2003 computer named Server4.You install Terminal Services on Server4. You add users from the technical support department to the Power Users group and to the Remote Desktop Users group on Server4. You notice that Server4 is periodically unavailable. You open Event Viewer on Server4 and discover that theserver was restarted accidentally by users in the technical support department.You need to ensure that users in the technical support department can establish a Terminal Service session and can manage local user accounts on Server4 without having the ability to restart Server 4.Which action or actions should you perform?() (Choose all that apply.)A. Remove the technical support user accounts from the Power Users group.B. Remove the technical support user accounts from the Remote Desktop Users group.C. Remove the Power Users group from the Shut down the system user right.D. Add the Power Users group to the Deny log on locally user right.E. Modify the permissions on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission.

考题 Which three statements are true about the working of system privileges in a multitenant control database(CDB) that has pluggable databases (PDBs)?() A. System privileges apply only to the PDB in which they are used.B. Local users cannot use local system privileges on the schema of a common user.C. The granter of system privileges must possess the set container privilege.D. Common users connected to a PDB can exercise privileges across other PDBs.E. System privileges with the with grant option container all clause must be granted to a common user before the common user can grant privileges to other users.

考题 Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" >"Sensors" >"Sensor Event Policies" >[rule name] to accomplish this?()A. IgnoreB. Replace users roleC. Terminate user sessionD. Disable user account

考题 Which of the following is true about the following share access properties? ()A、 +managers will be resolved as a Winbind group.  B、 The timo and taki users can manipulate files regardless of the file system permissions.  C、 +managers will be resolved as a Unix group.  D、 +managers is a builtin default Samba group.  E、 The "admin users" can be applied only to print shares.

考题 A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()A、the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor groupB、the user can see all the users except those in the Admin group, but can only modify the user’s own accountC、the user can see only the user’s own account, and cannot modify itD、the user can see only the user’s own account, and can change the password only

考题 Which two statements are true when using the configure exclusive CLI command?()A、Multiple users can enter configuration mode and have their own private configuration.B、When a user commits, only the user's changes are committed.C、A message indicates which other users are in configuration mode and what portion of the configuration they are editing.D、Only a single user can edit the configuration.

考题 You have a hosted Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack l (SP1) installed.The organization contains a distribution group named Group1.You need to ensure that a user named User1 can review and approve all messages sent to Group1. What should you do?()A、Modify the Managed By list for Group1.B、Create a new journal rule and specify User1 as the journal recipient.C、Modify the mail flow settings for User1.D、Modify the mail flow settings for Group1.

考题 Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" "Sensors" "Sensor Event Policies" [rule name] to accomplish this?()A、IgnoreB、Replace users roleC、Terminate user sessionD、Disable user account

考题 View the Exhibit to observe the roles assigned to the SL_REP user.  Which statement is true about theassignment of the SELECT_CATALOG_ROLE role to the SL_REP user()A、The user must enable the role explicitly.B、The user can grant the role to other users.C、The user cannot use the role until the DBA enables it explicitly.D、The user can start using the role immediately without any changes

考题 Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()A、It can be used to allow the access privilege settings for users but not roles.B、It can be used to allow the access privilege settings for users as well as roles.C、It can be used to control the time interval for which the access privilege is available to a user.D、It can be used to selectively restrict the access for each user in a database to different host computers.E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

考题 What are three actions performed by the mysql_secure_installation tool?()A、It prompts you to set the root user account passwordB、It checks whether file permissions are appropriate within datadirC、It asks to remove the test database, which is generated at installation timeD、It can delete any anonymous accountsE、It verifies that all users are configuration with the longer password hash

考题 Examine the query and its output executed In an RDBMS Instance:Which three statements are true about the users (other than sys) in the output?()A、The C # # B_ADMIN user can perform all backup and recovery operations using RMAN only.B、The C # # C_ADMIN user can perform the data guard operation with Data Guard Broker.C、The C # # A_ADMIN user can perform wallet operations.D、The C # # D_ADMIN user can perform backup and recovery operations for Automatic Storage Management (ASM).E、The C # # B_ADMIN user can perform all backup and recovery operations using RMAN or SQL* Plus.

考题 Which two statements accurately describe a role?()A、A role can be given to a maximum of 1000 users.B、A user can have access to a maximum of 10 roles.C、A role can have a maximum of 100 privileges contained in it.D、Privileges are given to a role by using the CREATE ROLE statement.E、A role is a named group of related privileges that can be granted to the user.F、A user can have access to several roles, and several users can be assigned the same role.

考题 Which three statements are true about the working of system privileges in a multitenant control database(CDB) that has pluggable databases (PDBs)?()A、System privileges apply only to the PDB in which they are used.B、Local users cannot use local system privileges on the schema of a common user.C、The granter of system privileges must possess the set container privilege.D、Common users connected to a PDB can exercise privileges across other PDBs.E、System privileges with the with grant option container all clause must be granted to a common user before the common user can grant privileges to other users.

考题 You are the network administrator for Among other duties you administer a Windows 2003 server named TestKingB. You install Terminal Services on TestKingB. You add users from the TestKing support department to the Power Users group and to the Remote Desktop Users group on TestKingB. You notice that TestKingB is periodically unavailable. You open Event Viewer on TestKingB and discover that the server was restarted accidentally by users in the TestKing support department. You need to ensure that users in the TestKing support department can establish a Terminal Services session and can manage local user accounts on TestKingB. However, they should not have the ability to restart TestKingB. Which action or actions should you perform? Select all that apply.()A、Remove the TestKing Support department user accounts from the Power Users group.B、Remove the TestKing Support department user accounts from the Remote Desktop Users group.C、Remove the Power Users group from the Shut down the system user right.D、Add the Power Users group to the Deny log on locally user right.E、Modify the permission on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission

考题 Your company has four offices.   The network contains a single Active Directory domain.   Each office has domain controller. Each office has an organitational unit (OU) that contains the  user accounts for the users in that office.   In each office, support technicians perform basic troubleshooting for the users in their respective  office.   You need to ensure that the support technicians can reset the password for the user accounts in  their respective office only. The solution must prevent the thechnicians from creating user  accounts.   What shoul you do()A、Four each OU, run the Delegation of Control Wizard.B、For the domain, run the Delegation of Control Wizard.C、For each office, create an Active Directory group, and then modify the security setting for each group.D、For each office, create an Active Directory group, and then modify the contorlAccessRights attirbute for each group

考题 You are the network administrator for You administer a Windows Server 2003 computer named TestKing3. A user needs to share documents that are stored in a folder on TestKing3 with other users in his department. When she attempt to share the folder, she discovers that the Sharing tab is missing. You need to ensure that the user can share the documents on TestKing3. You need to ensure that you grant the user the minimum amount of permissions required. What should you do?()A、Instruct the user to move the documents to the Shared Folders folder.B、Add the user's user account to the local Power Users group.C、Add the user's user account to the Network Configuration Operators group.D、Add the user's user account to the local Adminstrators group.

考题 单选题View the Exhibit and examine the privileges granted to the MGR_ROLE role. The user SKD has been grantedthe CONNECT and RESOURCE roles only. The database administrator (DBA) grants MGR_ROLE to the userSKD by executing the command: SQL GRANT MGR_ROLE TO SKD WITH ADMIN OPTION;  Which statement is true about the user SKD afterhe/she is granted this role()A The user SKD can grant only the MGR_ROLE role to other users, but not the privileges in it.B The user SKD can revoke the MGR_ROLE only from the users for whom he/she is the grantor.C The user SKD can grant the privileges in the MGR_ROLE role to other users, but not with ADMIN OPTION.D The user SKD can grant the privileges in the MGR_ROLE role to other users, but cannot revoke privilegesfrom them

考题 多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can be used to control the time interval for which the access privilege is available to a user.DIt can be used to selectively restrict the access for each user in a database to different host computers.EIt can be used to selectively restrict a user's access to different applications in a specific host computer.

考题 多选题Which two statements are true when using the configure exclusive CLI command?()AMultiple users can enter configuration mode and have their own private configuration.BWhen a user commits, only the user's changes are committed.CA message indicates which other users are in configuration mode and what portion of the configuration they are editing.DOnly a single user can edit the configuration.

考题 单选题Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" "Sensors" "Sensor Event Policies" [rule name] to accomplish this?()A IgnoreB Replace users roleC Terminate user sessionD Disable user account

考题 单选题You are the administrator of a Windows Server 2003 computer named Server4.You install Terminal Services on Server4. You add users from the technical support department to the Power Users group and to the Remote Desktop Users group on Server4. You notice that Server4 is periodically unavailable. You open Event Viewer on Server4 and discover that theserver was restarted accidentally by users in the technical support department.You need to ensure that users in the technical support department can establish a Terminal Service session and can manage local user accounts on Server4 without having the ability to restart Server 4.Which action or actions should you perform?() (Choose all that apply.)A Remove the technical support user accounts from the Power Users group.B Remove the technical support user accounts from the Remote Desktop Users group.C Remove the Power Users group from the Shut down the system user right.D Add the Power Users group to the Deny log on locally user right.E Modify the permissions on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission.

考题 多选题Which of the following is true about the following share access properties? ()A+managers will be resolved as a Winbind group.BThe timo and taki users can manipulate files regardless of the file system permissions.C+managers will be resolved as a Unix group.D+managers is a builtin default Samba group.EThe admin users can be applied only to print shares.

考题 单选题You are the network administrator for Among other duties you administer a Windows 2003 server named TestKingB. You install Terminal Services on TestKingB. You add users from the TestKing support department to the Power Users group and to the Remote Desktop Users group on TestKingB. You notice that TestKingB is periodically unavailable. You open Event Viewer on TestKingB and discover that the server was restarted accidentally by users in the TestKing support department. You need to ensure that users in the TestKing support department can establish a Terminal Services session and can manage local user accounts on TestKingB. However, they should not have the ability to restart TestKingB. Which action or actions should you perform? Select all that apply.()A Remove the TestKing Support department user accounts from the Power Users group.B Remove the TestKing Support department user accounts from the Remote Desktop Users group.C Remove the Power Users group from the Shut down the system user right.D Add the Power Users group to the Deny log on locally user right.E Modify the permission on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission

考题 单选题You share a folder named Folder1 on a computer that runs Windows XP Professional. Users report that they cannot access the folder from other computers on the network. You verify that all users can access Folder1 when logged on to the computer. You need to ensure that all users can access Folder1 from the network. What should you do?()A On Folder1, modify the share permissions.B On Folder1, modify the NTFS permissions.C Add all local user accounts to the Guests group. D Add all local user accounts to the Network Configuration Operators group.

考题 单选题You are the network administrator for You administer a Windows Server 2003 computer named TestKing3. A user needs to share documents that are stored in a folder on TestKing3 with other users in his department. When she attempt to share the folder, she discovers that the Sharing tab is missing. You need to ensure that the user can share the documents on TestKing3. You need to ensure that you grant the user the minimum amount of permissions required. What should you do?()A Instruct the user to move the documents to the Shared Folders folder.B Add the user's user account to the local Power Users group.C Add the user's user account to the Network Configuration Operators group.D Add the user's user account to the local Adminstrators group.

考题 多选题What are three actions performed by the mysql_secure_installation tool?()AIt prompts you to set the root user account passwordBIt checks whether file permissions are appropriate within datadirCIt asks to remove the test database, which is generated at installation timeDIt can delete any anonymous accountsEIt verifies that all users are configuration with the longer password hash