网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
What are three actions performed by the mysql_secure_installation tool?()
A
It prompts you to set the root user account password
B
It checks whether file permissions are appropriate within datadir
C
It asks to remove the test database, which is generated at installation time
D
It can delete any anonymous accounts
E
It verifies that all users are configuration with the longer password hash
参考答案
参考解析
解析:
暂无解析
更多 “多选题What are three actions performed by the mysql_secure_installation tool?()AIt prompts you to set the root user account passwordBIt checks whether file permissions are appropriate within datadirCIt asks to remove the test database, which is generated at installation timeDIt can delete any anonymous accountsEIt verifies that all users are configuration with the longer password hash” 相关考题
考题
What are three actions performed by the mysql_secure_installation tool?()
A.It prompts you to set the root user account passwordB.It checks whether file permissions are appropriate within datadirC.It asks to remove the test database, which is generated at installation timeD.It can delete any anonymous accountsE.It verifies that all users are configuration with the longer password hash
考题
You install a non-RAC Oracle Database. During Installation, the Oracle Universal Installer (OUI) prompts you to enter the path of the Inventory directory and also to specify an operating system group name.Which statement is true?()A. The ORACLE_BASE base parameter is not set.B. The installation is being performed by the root user.C. The operating system group that is specified should have the root user as its member.D. The operating system group that is specified must have permission to write to the inventory directory
考题
You use a recovery catalog for maintaining your database backups.You execute the following command:$rman TARGET / CATALOG rman / cat@catdbRMAN >BACKUP VALIDATE DATABASE ARCHIVELOG ALL;Which two statements are true?()A. Corrupted blocks, if any, are repaired.B. Checks are performed for physical corruptions.C. Checks are performed for logical corruptions.D. Checks are performed to confirm whether all database files exist in correct locationsE. Backup sets containing both data files and archive logs are created.
考题
A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A. Set folder permissions to 760.B. Set folder permissions to 770.C. Set folder permissions to modifyD. Set folder permissions to full control
考题
A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A、 Set folder permissions to 760.B、 Set folder permissions to 770.C、 Set folder permissions to modify.D、 Set folder permissions to full control.
考题
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. When you are absent, a user will use a login named Mary to log in and maintain the database snapshots. The user has to delete the database snapshots for DB1, so you have to give the appropriate permissions to the user. So which database permission should you give the user?() A、DELETE B、CONTROL C、DROP DATABASE D、ALTER ANY DATASPACE
考题
A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A、Set folder permissions to 760.B、Set folder permissions to 770.C、Set folder permissions to modifyD、Set folder permissions to full control
考题
You use a recovery catalog for maintaining your database backups.You execute the following command:$rman TARGET / CATALOG rman / cat@catdbRMAN BACKUP VALIDATE DATABASE ARCHIVELOG ALL;Which two statements are true?()A、Corrupted blocks, if any, are repaired.B、Checks are performed for physical corruptions.C、Checks are performed for logical corruptions.D、Checks are performed to confirm whether all database files exist in correct locationsE、Backup sets containing both data files and archive logs are created.
考题
You are maintaining an OLTP database in Oracle10g. You find that the database is generating a large number of trace files. You decide to disable the trace files generated by the ARCn background process. Which action will enable you to disable the trace files generated by the ARCn background process?() A、 Remove the LOG_ARCHIVE_DEST parameter from the init.ora file.B、 Set the value of the SQL_TRACE parameter to FALSE in the init.ora file.C、 Use the DBMS_MONITOR.SESSION_TRACE_DISABLE procedure.D、 Set the value of the LOG_ARCHIVE_TRACE initialization parameter to zero.
考题
You work as a database administrator for Certkiller .com. Your database is in the MOUNT state and you execute the following command to open it ALTER DATABASE OPEN; What two actions are performed as a result of this command?()A、All control files are openedB、All redo files are openedC、The password file is openedD、The parameter file is openedE、All online data files are opened
考题
What are three actions performed by the mysql_secure_installation tool?()A、It prompts you to set the root user account passwordB、It checks whether file permissions are appropriate within datadirC、It asks to remove the test database, which is generated at installation timeD、It can delete any anonymous accountsE、It verifies that all users are configuration with the longer password hash
考题
You install a non-RAC Oracle Database. During Installation, the Oracle Universal Installer (OUI) prompts you to enter the path of the Inventory directory and also to specify an operating system group name. Which statement is true?()A、The ORACLE_BASE base parameter is not set.B、The installation is being performed by the root user.C、The operating system group that is specified should have the root user as its member.D、The operating system group that is specified must have permission to write to the inventory directory
考题
You are installing Oracle Database 11g on your server. During the installation Oracle Universal Installer (OUI) prompts you to enter the path of the inventory directory and also prompts you to specify an operating systemgroup name. Which statement is true in this case()A、The ORACLE_BASE parameter is not set.B、The installation is being performed by the root user.C、The operating system group that will be specified should have root user as its member.D、The installation is being performed without the "Create Starter Database" option selected.E、The operating system group that will be specified must have permission to write to the inventory directory
考题
You need to ensure that users who enter three successive invalid passwords within 5 minutes are locked out for 5 minutes. Which three actions should you perform()A、Set the Minimum password age setting to one day.B、Set the Maximum password age setting to one day.C、Set the Account lockout duration setting to 5 minutes.D、Set the Reset account lockout counter after setting to 5 minutes.E、Set the Account lockout threshold setting to 3 invalid logon attempts.F、Set the Enforce password history setting to 3 passwords remembered.
考题
Your company is planning to deploy Windows 7 to all client computers. You have the following requirements: Test an application to detect potential compatibility issues caused by User Account Control (UAC). Monitor an application’s operating system use. You need to select the appropriate method to detect application compatibility issues. What should you do?()A、Use the Standard User Analyzer tool.B、Use the Standard User Analyzer Wizard.C、Use the standalone Setup Analysis Tool.D、Use the Setup Analysis Tool in a virtual environment.
考题
You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder. What should you do?()A、Map a network drive to the AccSecured/intern folder from Richard’s computer.B、Map a network drive to the AccSecured shared folder from Richard’s computer.C、Allow the intern user account modify permissions on the intern subfolder.D、Allow the intern user account traverse folder/execute file permission on the AccSecured folder.E、Allow the intern user account list folder content permission on the AccSecured folder. Removeread extended attributes and read permissions.
考题
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named ServiceGreatUser. A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database user can only perform the two tasks below: the database user executes all stored procedures that currently exist in the Sales database and executes all stored procedures that will be created in the Sales database. So what should you do to ensure this? ()A、ServiceGreatUser should be added to the appropriate fixed database roles. B、You should assign the appropriate object-level permissions to ServiceGreatUser C、You should assign the appropriate server-level permissions to ServiceGreatLogin D、You should assign the appropriate database-level permissions to ServiceGreatUser
考题
You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder. What should you do?()A、 Map a network drive to the AccSecuredintern folder from Richard’s computer. B、 Map a network drive to the AccSecured shared folder from Richard’s computer. C、 Allow the intern user account modify permissions on the intern subfolder. D、 Allow the intern user account traverse folder/execute file permission on the AccSecured folder. E、 Allow the intern user account list folder content permission on the AccSecured folder. Remove read extended attributes and read permissions.
考题
多选题Which two statements are true about the rescue configuration file?()AIt must include a root passwordBIt is roll back file number 50, and you can recover it by issuing rollback 50CIt is created by issuing request system configuration rescue saveDIt is updated automatically when you commit
考题
单选题A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A
Set folder permissions to 760.B
Set folder permissions to 770.C
Set folder permissions to modifyD
Set folder permissions to full control
考题
单选题You are installing Oracle Database 11g on your server. During the installation Oracle Universal Installer (OUI) prompts you to enter the path of the inventory directory and also prompts you to specify an operating systemgroup name. Which statement is true in this case()A
The ORACLE_BASE parameter is not set.B
The installation is being performed by the root user.C
The operating system group that will be specified should have root user as its member.D
The installation is being performed without the Create Starter Database option selected.E
The operating system group that will be specified must have permission to write to the inventory directory
考题
多选题You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()AImport the user accounts as inetOrgPerson objects.BImport the user accounts into Active Directory by using the Ldifde command-line tool.CExport all user accounts from the UNIX servers to a text file.DExport all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.EAssign random passwords to each user object, and securely distribute the password to the users.FCreate the same strong password for each user object, and require users to change their passwords at first logon.
考题
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named ServiceGreatUser. A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database user can only perform the two tasks below: the database user executes all stored procedures that currently exist in the Sales database and executes all stored procedures that will be created in the Sales database. So what should you do to ensure this? ()A
ServiceGreatUser should be added to the appropriate fixed database roles. B
You should assign the appropriate object-level permissions to ServiceGreatUser C
You should assign the appropriate server-level permissions to ServiceGreatLogin D
You should assign the appropriate database-level permissions to ServiceGreatUser
考题
多选题You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder. What should you do?()AMap a network drive to the AccSecuredintern folder from Richard’s computer.BMap a network drive to the AccSecured shared folder from Richard’s computer.CAllow the intern user account modify permissions on the intern subfolder.DAllow the intern user account traverse folder/execute file permission on the AccSecured folder.EAllow the intern user account list folder content permission on the AccSecured folder. Remove read extended attributes and read permissions.
考题
多选题You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder. What should you do?()AMap a network drive to the AccSecured/intern folder from Richard’s computer.BMap a network drive to the AccSecured shared folder from Richard’s computer.CAllow the intern user account modify permissions on the intern subfolder.DAllow the intern user account traverse folder/execute file permission on the AccSecured folder.EAllow the intern user account list folder content permission on the AccSecured folder. Removeread extended attributes and read permissions.
考题
单选题A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A
Set folder permissions to 760.B
Set folder permissions to 770.C
Set folder permissions to modify.D
Set folder permissions to full control.
考题
多选题You work as a database administrator for Certkiller .com. Your database is in the MOUNT state and you execute the following command to open it ALTER DATABASE OPEN; What two actions are performed as a result of this command?()AAll control files are openedBAll redo files are openedCThe password file is openedDThe parameter file is openedEAll online data files are opened
考题
多选题What are three actions performed by the mysql_secure_installation tool?()AIt prompts you to set the root user account passwordBIt checks whether file permissions are appropriate within datadirCIt asks to remove the test database, which is generated at installation timeDIt can delete any anonymous accountsEIt verifies that all users are configuration with the longer password hash
热门标签
最新试卷