网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Evaluate the following block of code: BEGIN DBMS_NETWORK_ACL_ADMIN.CREATE_ACL ( acl => ’mycompany-com-permissions.xml’, principal => ’ACCT_MGR’, is_grant => TRUE, privilege => ’connect’); DBMS_NETWORK_ACL_ADMIN.ASSIGN_ACL ( acl => ’mycompany-com-permissions.xml’, host => ’*.mycompany.com’); END; What is the outcome of the above code?()
A
It produces an error because a fully qualified host name needs to be specified.
B
It produces an error because the range of ports associated with the hosts has not been specified.
C
It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT and RESOLVE privileges.
D
It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT privilege but not the RESOLVE privilege.
参考答案
参考解析
解析:
暂无解析
更多 “单选题Evaluate the following block of code: BEGIN DBMS_NETWORK_ACL_ADMIN.CREATE_ACL ( acl = ’mycompany-com-permissions.xml’, principal = ’ACCT_MGR’, is_grant = TRUE, privilege = ’connect’); DBMS_NETWORK_ACL_ADMIN.ASSIGN_ACL ( acl = ’mycompany-com-permissions.xml’, host = ’*.mycompany.com’); END; What is the outcome of the above code?()A It produces an error because a fully qualified host name needs to be specified.B It produces an error because the range of ports associated with the hosts has not been specified.C It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT and RESOLVE privileges.D It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT privilege but not the RESOLVE privilege.” 相关考题
考题
Evaluate the following block of code:What is the outcome of the above code?()
A. It produces an error because a fully qualified host name needs to be specified.B. It produces an error because the range of ports associated with the hosts has not been specified.C. It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT and RESOLVE privileges.D. It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT privilege but not the RESOLVE privilege.
考题
Evaluatethefollowingblockofcode:BEGINDBMS_NETWORK_ACL_ADMIN.CREATE_ACL(acl=’mycompany-com-permissions.xml’,principal=’ACCT_MGR’,is_grant=TRUE,privilege=’connect’);DBMS_NETWORK_ACL_ADMIN.ASSIGN_ACL(acl=’mycompany-com-permissions.xml’,host=’*.mycompany.com’);END;Whatistheoutcomeoftheabovecode?()A.Itproducesanerrorbecauseafullyqualifiedhostnameneedstobespecified.B.Itproducesanerrorbecausetherangeofportsassociatedwiththehostshasnotbeenspecified.C.Itcreatesanaccesscontrollist(ACL)withtheuserACCT_MGRwhogetstheCONNECTand RESOLVEprivileges.D.Itcreatesanaccesscontrollist(ACL)withtheuserACCT_MGRwhogetstheCONNECT privilegebutnottheRESOLVEprivilege.
考题
What is true about a Pre-Block ACLconfigured when setting up your sensor toperform IP Blocking?()A、 The Pre-Block ACL is overwritten when a blockingaction is initiatied by the sensorB、 The blocking ACL entries generated by the sensor override the Pre-Block ACL entriesC、 The Pre-Block ACL entries override the blocking ACL entries generated by the sensorD、 The Pre-Block ACL is replaced by the Post-Block ACL when a blocking actionis initiated bythe sensorE、 You can not configure a Pre-Block ACL when configuring IP Blockingon your sensor
考题
Which expressions will evaluate to true if preceded by the following code?() String a = "hello"; String b = new String(a); String c = a; char[] d = { ’h’, ’e’, ’l’, ’l’, ’o’ }; A、(a == "Hello")B、(a == b)C、(a == c)D、a.equals(b)E、a.equals(d)
考题
Which of the following is true of an ACL when a packet matching an ACE is found?()A、The matching ACE is skipped to allow all other ACEs to be examined.B、The matching ACE is processed and then the last ACE is examined.C、The matching ACE is processed and then the next ACE is examined.D、The matching ACE is processed and the next packet is examined
考题
Which three statements about IOS Firewall configurations are true?()A、The IP inspection rule can be applied in the inbound direction on the secured interface.B、The IP inspection rule can be applied in the outbound direction on the unsecured interface.C、The ACL applied in the outbound direction on the unsecured interface should be an extended ACL.D、The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.E、For temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.F、For temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.
考题
Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()A、It can be used to block bulk encryption attacksB、It can be used to protect against denial of service attacksC、Traffic originating from the router is considered trusted, so it is not inspectedD、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyE、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session
考题
In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?() A、 the destination was manually added to the block listB、 the malware category is set to blocking modeC、 the transaction was blocked because of application or object propertiesD、 the transaction was manually blocked by the administrative user
考题
Which of the following could be used to restrict access to the local web server to only certain IP addresses?()A、 Create an ACL.B、 Create an application exception.C、 Configure IPSec.D、 Block port 80.
考题
On which of the following network devices would an administrator configure an ACL?()A、RouterB、HubC、RepeaterD、NIC
考题
Which of the following will begin a new unit of work?()A、The CONNECT statementB、The first FETCH of a cursorC、The BEGIN TRANSACTION statementD、The first executable SQL statement
考题
Evaluate the following block of code: BEGIN DBMS_NETWORK_ACL_ADMIN.CREATE_ACL ( acl = ’mycompany-com-permissions.xml’, principal = ’ACCT_MGR’, is_grant = TRUE, privilege = ’connect’); DBMS_NETWORK_ACL_ADMIN.ASSIGN_ACL ( acl = ’mycompany-com-permissions.xml’, host = ’*.mycompany.com’); END; What is the outcome of the above code?()A、 It produces an error because a fully qualified host name needs to be specified.B、 It produces an error because the range of ports associated with the hosts has not been specified.C、 It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT and RESOLVE privileges.D、 It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT privilege but not the RESOLVE privilege.
考题
You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()A、It is a list of remote database links stored in the XML file that are available to the users of the database.B、It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.C、It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.D、It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.
考题
You issue the following code: EXEC DBMS_RESOURCE_MANAGER_PRIVS.GRANT_SWITCH_CONSUMER_GROUP (’SCOTT’ ’GRP1’, TRUE); What will be the result of executing the above code?() A、 The switch privilege will be granted to the user, Scott, for changing the consumer group to GRP1.B、 The switch privilege will be granted to the user, Scott, for changing the consumer group from GRP1 to any other group.C、 The code will not execute successfully because there is no GRANT_SWITCH_CONSUMER_GROUP procedure in the DBMS_RESOURCE_MANAGER_PRIVS package.D、The code will execute successfully but no privilege will be granted to the user, Scott.
考题
You issued the following block of code: SQLBEGIN DBMS_RESOURCE_MANAGER_PRIVS.GRANT_SWITCH_CONSUMER_GROUP( ’PROG_ROLE’, ’DEVELOPERS’ ,FALSE); END; SQL/ Which option is NOT a result of executing the above code?() A、 The switch privilege is granted to the PROG_ROLE role.B、 The users granted the role PROG_ROLE will be able to switch to the DEVELOPERS group.C、 The users cannot grant the switch privilege to other users.D、 The above code will not be executed successfully because the GRANT_SWITCH_CONSUMER_GROUP procedure is an invalid procedure in Oracle10g.
考题
单选题Which of the following could be used to restrict access to the local web server to only certain IP addresses?()A
Create an ACL.B
Create an application exception.C
Configure IPSec.D
Block port 80.
考题
单选题Which of the following wiring distribution components uses a bridge clip to connect both sides ofthe block?()A
110 blockB
DemarcC
Smart jackD
66 block
考题
单选题On which of the following network devices would an administrator configure an ACL?()A
RouterB
HubC
RepeaterD
NIC
考题
多选题Which expressions will evaluate to true if preceded by the following code?() String a = "hello"; String b = new String(a); String c = a; char[] d = { ’h’, ’e’, ’l’, ’l’, ’o’ };A(a == Hello)B(a == b)C(a == c)Da.equals(b)Ea.equals(d)
考题
单选题Which of the following will begin a new unit of work?()A
The CONNECT statementB
The first FETCH of a cursorC
The BEGIN TRANSACTION statementD
The first executable SQL statement
考题
单选题Which of the following is true of an ACL when a packet matching an ACE is found?()A
The matching ACE is skipped to allow all other ACEs to be examined.B
The matching ACE is processed and then the last ACE is examined.C
The matching ACE is processed and then the next ACE is examined.D
The matching ACE is processed and the next packet is examined
考题
单选题You issue the following code: EXEC DBMS_RESOURCE_MANAGER_PRIVS.GRANT_SWITCH_CONSUMER_GROUP (’SCOTT’ ’GRP1’, TRUE); What will be the result of executing the above code?()A
The switch privilege will be granted to the user, Scott, for changing the consumer group to GRP1.B
The switch privilege will be granted to the user, Scott, for changing the consumer group from GRP1 to any other group.C
The code will not execute successfully because there is no GRANT_SWITCH_CONSUMER_GROUP procedure in the DBMS_RESOURCE_MANAGER_PRIVS package.D
The code will execute successfully but no privilege will be granted to the user, Scott.
考题
单选题What is true about a Pre-Block ACLconfigured when setting up your sensor toperform IP Blocking?()A
The Pre-Block ACL is overwritten when a blockingaction is initiatied by the sensorB
The blocking ACL entries generated by the sensor override the Pre-Block ACL entriesC
The Pre-Block ACL entries override the blocking ACL entries generated by the sensorD
The Pre-Block ACL is replaced by the Post-Block ACL when a blocking actionis initiated bythe sensorE
You can not configure a Pre-Block ACL when configuring IP Blockingon your sensor
考题
多选题Which three statements about IOS Firewall configurations are true?()AThe IP inspection rule can be applied in the inbound direction on the secured interface.BThe IP inspection rule can be applied in the outbound direction on the unsecured interface.CThe ACL applied in the outbound direction on the unsecured interface should be an extended ACL.DThe ACL applied in the inbound direction on the unsecured interface should be an extended ACL.EFor temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.FFor temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.
考题
单选题In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?()A
the destination was manually added to the block listB
the malware category is set to blocking modeC
the transaction was blocked because of application or object propertiesD
the transaction was manually blocked by the administrative user
考题
单选题ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()A
It is a list of remote database links stored in the XML file that are available to the users of the database.B
It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.C
It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.D
It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.
考题
单选题You issued the following block of code: SQLBEGIN DBMS_RESOURCE_MANAGER_PRIVS.GRANT_SWITCH_CONSUMER_GROUP( ’PROG_ROLE’, ’DEVELOPERS’ ,FALSE); END; SQL/ Which option is NOT a result of executing the above code?()A
The switch privilege is granted to the PROG_ROLE role.B
The users granted the role PROG_ROLE will be able to switch to the DEVELOPERS group.C
The users cannot grant the switch privilege to other users.D
The above code will not be executed successfully because the GRANT_SWITCH_CONSUMER_GROUP procedure is an invalid procedure in Oracle10g.
热门标签
最新试卷