网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
When should you create a role? ()
A

To simplify the process of creating new users using the CREATE USER xxx IDENTIFIED by yyy statement.

B

To grant a group of related privileges to a user.

C

When the number of people using the database is very high.

D

To simplify the process of granting and revoking privileges.

E

To simplify profile maintenance for a user who is constantly traveling.


参考答案

参考解析
解析: 暂无解析
更多 “多选题When should you create a role? ()ATo simplify the process of creating new users using the CREATE USER xxx IDENTIFIED by yyy statement.BTo grant a group of related privileges to a user.CWhen the number of people using the database is very high.DTo simplify the process of granting and revoking privileges.ETo simplify profile maintenance for a user who is constantly traveling.” 相关考题
考题 You need to perform these tasks:1. Create and assign a MANAGER role to Blake and Clark2. Grant CREATE TABLE and CREATE VIEW privileges to Blake and ClarkWhich set of SQL statements achieves the desired results? ()A. CREATE ROLE manager; GRANT create table, create view TO manager; GRANT manager TO BLACK, CLARK;B. CREATE ROLE manager; GRANT create table, create voew TO manager; GRANT manager ROLE TO BLACK, CLARK;C. GRANT manager ROLE TO BLACK, CLARK; GRANT create table, create voew TO BLACK CLARK; ***MISSING***

考题 When should you create a role? () A. To simplify the process of creating new users using the CREATE USER xxx IDENTIFIED by yyy statement.B. To grant a group of related privileges to a user.C. When the number of people using the database is very high.D. To simplify the process of granting and revoking privileges.E. To simplify profile maintenance for a user who is constantly traveling.

考题 In which two situations should you run the command sync group?() (Choose two.) A. when you enable Unified FailoverB. when you create an ActiveN groupC. when you synchronize the sticky tableD. when you require synchronization of the 3G Cache objects

考题 You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.You want to minimize changes to your security model and to your database applications. How should you modify the database?A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.

考题 In which two situations should you run the command sync group?() (Choose two.)A、when you enable Unified FailoverB、when you create an ActiveN groupC、when you synchronize the sticky tableD、when you require synchronization of the 3G Cache objects

考题 You are designing a Windows Azure application.  The application includes two web roles and three instances of a worker role.  The web roles will send requests to the worker role through one or more Windows Azure Queues. You have the following requirements:   - Ensure that each request is processed exactly one time.   - Minimize the idle time of each worker role instance. - Maximize the reliability of request processing.   You need to recommend a queue design for sending requests to the worker role.  What should you recommend?()A、 Create a single queue.  Send requests on the single queue.B、 Create a queue for each web role.  Send requests on all queues at the same time.C、 Create a queue for each workerrole instance.  Send requests on each worker queue in a round robin.D、 Create a queue for each combination of web roles and worker role instances.  Send requests to all worker role instances based on the sending web role.

考题 You want to create a role to meet these requirements:  1:The role is to be protected from unauthorized usage.  2:The password of the role is not to be embedded in the application source code or stored in a table.  Which method would you use to restrict enabling of such roles()A、Create the role with global authentication.B、Create the role with external authentication.C、Create the role as a secure application role.D、Create the role as a password-protected role.E、Create a role and use Fine-Grained Access Control (FGAC) to secure the role.

考题 You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()A、Create the role with external authentication.B、Create the role as a secure application role.C、Create the role as a password-protected role.D、Create a role and use Fine-Grained Access Control (FGAC) to secure the role

考题 You need to perform these tasks: 1. Create and assign a MANAGER role to Blake and Clark 2. Grant CREATE TABLE and CREATE VIEW privileges to Blake and Clark Which set of SQL statements achieves the desired results?()A、CREATE ROLE manager; GRANT create table, create view TO manager; GRANT manager TO BLACK, CLARK;B、CREATE ROLE manager; GRANT create table, create voew TO manager; GRANT manager ROLE TO BLACK, CLARK;C、GRANT manager ROLE TO BLACK, CLARK; GRANT create table, create voew TO BLACK CLARK; ***MISSING***

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You have the Windows Deployment Services (WDS) role installed on a serverthat runs Windows Server 2008. You plan to install Windows Vista on a computer that does not supportPreboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server. You have to start the computer and install the image that is stored on the WDS server. What should you create?()A、You should create a discover imageB、You should create an install imageC、You should create a capture imageD、You should create a CD-ROM that contains PXE drivers

考题 .Your companys virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to provide a user with the ability to perform only the Create, Delete, Start, Stop, Pause, Resume, and Shut Down virtual machine (VM) management tasks on your host servers .  What should you do?()A、In VMM,create a Self-Service user role.B、In VMM,create a Delegated Administrator user role.C、In VMM,assign the Local Administrator permission for the host servers to the user.D、In Authorization Manager, create a role on the users client computer and add the user to this role.

考题 You are planning the migration of an existing application to Windows Azure and SQL Azure.  The application produces report files at the request of remote systems.   Requests for report files will be placed into a single Windows Azure Queue.   You must minimize the compute resources and storage transactions required to process the requests.   You need to recommend an approach for processing the requests. What should you recommend?()A、 Create a worker role for each report file that constantly polls the queue for requests.B、 Create a workerrole for each report file that checks the queue at scheduled intervals for requests.C、 Create a single worker role that constantly polls the queue for requests and executes the requests on multiple threads.D、 Create a single worker role that checks the queue at scheduled intervals for requests and executes the requests on multiple threads.

考题 You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. Developers are members of an AD security group named  Development. You need to ensure that on a specific host server, members of the Development group can perform only the Create,Modify,and Remove VM management tasks. What should you do?()A、Create a Self-Service user role and add the Development group to this role.B、Create a Delegated Administrator user role and add the Development group to this role.C、In Authorization Manager, create a role on the client computer of each member of the Development group, and add the Development group to this role.D、Install Hyper-V Manager on the client computer of each member of the Development group,and grant the Development group administrative privileges on the specific server.

考题 You have an Exchange Server 2010 organization.You need to use Role Based Access Control (RBAC) to provide a user the ability to manage recipients in a specific organizational unit (OU).  What should you do first?()A、Create a new direct role assignment.B、Create a new management role assignment policy.C、Create a new management scope.D、Modify the default management scope.

考题 You are designing a Windows Azure application that will use a worker role. The worker role will create temporary files.  You need to recommend an approach for creating the temporary files that minimizes storage transactions.  What should you recommend?()A、 Create the files on a Windows Azure Drive.B、 Create the files in Windows Azure local storage.C、 Create the files in Windows Azure Storage page blobs.D、 Create the files in Windows Azure Storage block blobs.

考题 Your company has a main office and a branch office.The branch office administrators are the only members of a custom management role group.The role group is configured to allow members to manage recipients. You notice that the branch office administrators can manage recipients in both offices.You need to ensure that the branch office administrators can manage recipients in the branch office only. What should you do?()A、Create and associate a management scope to the role group.B、Create and associate a management role assignment policy to the role group.C、Create a new linked role group, and then add the branch office administrators to the role group.D、Create a new role, and then add management role entries to the role.

考题 You have an Exchange 2010 organization.You have an administrative user named Admin1.You need to ensure that Admin1 can move mailboxes in the organization.The solution must assign the minimum amount of permissions to Admin1. What should you do?()A、Create a local move request.B、Create a custom Management role.Assign the role to Admin1.C、Add Admin1 to the Organization Management role group.D、Add Admin1 to the Recipient Management security group.

考题 You plan to host a Windows Communication Foundation (WCF) service in a Windows Azure worker role.  Custom code is necessary to initialize and configure the service endpoint.   You need to recommend the point at which the application should initialize the WCF service.  What should you recommend?()A、 When Windows Azure initializes the worker role instance.B、 When the worker role instance receives its first request.C、 When the worker role instance instantiates the WCF service.D、 When the worker role instance enters the main execution thread.

考题 Your company has a main office and a branch office. All branch office administrators are members of a custom management role group.The role group is configured to allow members to manage recipients.The branch office administrators are also members of The Domain Admins security group. The organization contains one Exchange Server 2010 server. You discover that the branch office administrators can manage recipients in both offices. You need to ensure that the branch office administrators can manage recipients in their assigned branch office only.What should you do?()A、Create a new management role entry for the role group.B、Create a management role assignment policy and associate the policy to the role group.C、Create a management scope and associate the scope to the role group.Set a recipient filter for the management scope.D、Remove the branch office administrators from the Domain Admins group.Add the branch office recipients to the role group.

考题 单选题You are planning the migration of an existing application to Windows Azure and SQL Azure.  The application produces report files at the request of remote systems.   Requests for report files will be placed into a single Windows Azure Queue.   You must minimize the compute resources and storage transactions required to process the requests.   You need to recommend an approach for processing the requests. What should you recommend?()A  Create a worker role for each report file that constantly polls the queue for requests.B  Create a workerrole for each report file that checks the queue at scheduled intervals for requests.C  Create a single worker role that constantly polls the queue for requests and executes the requests on multiple threads.D  Create a single worker role that checks the queue at scheduled intervals for requests and executes the requests on multiple threads.

考题 单选题You need to perform these tasks: 1. Create and assign a MANAGER role to Blake and Clark 2. Grant CREATE TABLE and CREATE VIEW privileges to Blake and Clark Which set of SQL statements achieves the desired results? ()A CREATE ROLE manager; GRANT create table, create view TO manager; GRANT manager TO BLACK, CLARK;B CREATE ROLE manager; GRANT create table, create voew TO manager; GRANT manager ROLE TO BLACK, CLARK;C GRANT manager ROLE TO BLACK, CLARK; GRANT create table, create voew TO BLACK CLARK; ***MISSING***

考题 单选题You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources. You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process. Which configuration solves this problem?()A Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.B Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.C Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the stop processing rules when this rule matches function on this role.D Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.

考题 单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You have the Windows Deployment Services (WDS) role installed on a serverthat runs Windows Server 2008. You plan to install Windows Vista on a computer that does not supportPreboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server. You have to start the computer and install the image that is stored on the WDS server. What should you create?()A You should create a discover imageB You should create an install imageC You should create a capture imageD You should create a CD-ROM that contains PXE drivers

考题 单选题Your company has an Active Directory forest. You plan to install an Enterprise certification authority (CA) on a dedicated stand-alone server. When you attempt to add the Active Directory Certificate Services (AD CS) role, you find that the Enterprise CA option is not available. You need to install the AD CS role as an Enterprise CA. What should you do first()A Add the DNS Server role.B Join the server to the domain.C Add the Web server (IIS) role and the AD CS role.D Add the Active Directory Lightweight Directory Service (AD LDS) role.

考题 单选题You plan to host a Windows Communication Foundation (WCF) service in a Windows Azure worker role.  Custom code is necessary to initialize and configure the service endpoint.   You need to recommend the point at which the application should initialize the WCF service.  What should you recommend?()A  When Windows Azure initializes the worker role instance.B  When the worker role instance receives its first request.C  When the worker role instance instantiates the WCF service.D  When the worker role instance enters the main execution thread.

考题 单选题You create a Web site that is for members only. The behavior of the Web site changes according to the role of the user. The Web site uses the ASP.NET Membership control for creation of user accounts. You need to find out whether a user is a member of a particular role. What should you do? ()A Pass the user names and passwords to Membership.ValidateUser.B Pass the role names to User.IsInRole.C Pass the role names to Roles.RoleExists.D Pass the user names to Membership.GetUser.

考题 单选题You are designing a Windows Azure application that will use a worker role. The worker role will create temporary files.  You need to recommend an approach for creating the temporary files that minimizes storage transactions.  What should you recommend?()A  Create the files on a Windows Azure Drive.B  Create the files in Windows Azure local storage.C  Create the files in Windows Azure Storage page blobs.D  Create the files in Windows Azure Storage block blobs.

考题 多选题When should you create a role?()ATo simplify the process of creating new users using the CREATE USER xxx IDENTIFIED by yyy statement.BTo grant a group of relate privileges to a user.CWhen the number of people using the database is very high.DTo simplify the process of granting and revoking privileges.ETo simplify profile maintenance for a user who is constantly traveling.