网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following statements is used to prevent user TOM from adding and deleting data in table TAB1?()
A
REVOKE ADD, DELETE FROM USER tom ON TABLE tab1
B
REVOKE ADD, DELETE ON TABLE tab1 FROM USER tom
C
REVOKE INSERT, DELETE FROM USER tom ON TABLE tab1
D
REVOKE INSERT, DELETE ON TABLE tab1 FROM USER tom
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following statements is used to prevent user TOM from adding and deleting data in table TAB1?()A REVOKE ADD, DELETE FROM USER tom ON TABLE tab1B REVOKE ADD, DELETE ON TABLE tab1 FROM USER tomC REVOKE INSERT, DELETE FROM USER tom ON TABLE tab1D REVOKE INSERT, DELETE ON TABLE tab1 FROM USER tom” 相关考题
考题
A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()
A.EDITB.CHMODC.ATTRIBD.CONVERT
考题
Which of the following statements is used to grant user TOM and Application team APPGRP the ability to add data to table TAB1?()
A.GRANT ADD DATA ON TABLE tab1 TO GROUP tom appgrpB.GRANT INSERT TO USER tom, GROUP appgrp ON TABLE tab1C.GRANT INSERT ON TABLE tab1 TO USER tom, GROUP appgrpD.GRANT ADD DATA ON TABLE tab1 TO USER appgrp, GROUP tom
考题
Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()
A.REVOKE ACCESS ON DATABASE FROM USER bobB.REVOKE CONNECT ON DATABASE FROM USER tomC.REVOKE tom FROM ACCESS ON DATABASE BY USER bobD.REVOKE tom FROM CONNECT ON DATABASE BY USER bob
考题
Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()
A.REVOKE ALL PRIVILEGES FROM USER tomB.REVOKE ALL ON EMPLOYEE FROM USER tomC.REVOKE EXECUTE ON EMPLOYEE FROM USER tomD.REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom
考题
The man page for command shows the following syntax: The man page for command shows the following syntax: command [ -a | -b ] Which of the following statements is true regarding this entry?()
A. Either the -a or flag -b may be used, but not both.B. If the flag -a is used then the flag -b also must be used.C. One of the -a or -b flags must be used, but not both at the same time.D. Both the flags may be used together, but neither are mandatory.
考题
The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?()
A. The default administrative distance is used.B. The command is used to establish a static route.C. The command is used to configure the router interfaces.D. The command is used to establish a stub network.E. The subnet mask for the source address is 255.255.255.0
考题
Which of the following statements is true regarding the VERSIONS BETWEEN clause?() A、 The VERSIONS BETWEEN clause may be used in DML statements.B、 The VERSIONS BETWEEN clause may be used in DDL statements.C、 The VERSIONS BETWEEN clause may not be used to query past DDL changes to tables.D、 The VERSIONS BETWEEN clause may not be used to query past DML statements to tables.
考题
The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?()A、The default administrative distance is used.B、The command is used to establish a static route.C、The command is used to configure the router interfaces.D、The command is used to establish a stub network.E、The subnet mask for the source address is 255.255.255.0
考题
Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A、RIPB、0S:FC、STPD、EGP
考题
A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()A、EDITB、CHMODC、ATTRIBD、CONVERT
考题
Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()A、BIOS passwordB、Domain membershipC、EFSD、Bitlocker
考题
Which of the following is the BEST way to prevent social engineering tactics?()A、End user trainingB、Antivirus softwareC、Group policyD、Encryption
考题
Which of the following statements is used to prevent user TOM from adding and deleting data in table TAB1?()A、REVOKE ADD, DELETE FROM USER tom ON TABLE tab1B、REVOKE ADD, DELETE ON TABLE tab1 FROM USER tomC、REVOKE INSERT, DELETE FROM USER tom ON TABLE tab1D、REVOKE INSERT, DELETE ON TABLE tab1 FROM USER tom
考题
Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A、REVOKE ACCESS ON DATABASE FROM USER bobB、REVOKE CONNECT ON DATABASE FROM USER tomC、REVOKE tom FROM ACCESS ON DATABASE BY USER bobD、REVOKE tom FROM CONNECT ON DATABASE BY USER bob
考题
Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()A、REVOKE ALL PRIVILEGES FROM USER tomB、REVOKE ALL ON EMPLOYEE FROM USER tomC、REVOKE EXECUTE ON EMPLOYEE FROM USER tomD、REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom
考题
The man page for command shows the following syntax: The man page for command shows the following syntax: command [ -a | -b ] Which of the following statements is true regarding this entry?()A、Either the -a or flag -b may be used, but not both.B、If the flag -a is used then the flag -b also must be used.C、One of the -a or -b flags must be used, but not both at the same time.D、Both the flags may be used together, but neither are mandatory.
考题
A user calls to report they are getting I/O errors on a file system. Which of the following tools should be used to isolate this problem?()A、dfB、diagrptC、errmsgD、errpt
考题
Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()A、It can be used to allow the access privilege settings for users but not roles.B、It can be used to allow the access privilege settings for users as well as roles.C、It can be used to control the time interval for which the access privilege is available to a user.D、It can be used to selectively restrict the access for each user in a database to different host computers.E、It can be used to selectively restrict a user's access to different applications in a specific host computer.
考题
Which is the source used by Automatic SQL Tuning that runs as part of the AUTOTASK framework?()A、 SQL statements that are part of the AWR baseline onlyB、 SQL statements based on the AWR top SQL identificationC、 SQL statements that are part of the available SQL Tuning Set (STS) onlyD、 SQL statements that are available in the cursor cache and executed by a user other than SYS
考题
多选题In your multitenant container database (CDB) containing same pluggable databases (PDBs), you execute the following commands in the root container: Which two statements are true?()AThe C # # ROLE1 role is created in the root database and all the PDBs.BThe C # # ROLE1 role is created only in the root database because the container clause is not used.CPrivileges are granted to the C##A_ADMIN user only in the root database.DPrivileges are granted to the C##A_ADMIN user in the root database and all PDBs.EThe statement for granting a role to a user fails because the CONTAINER clause is not used.
考题
单选题Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A
RIPB
0S:FC
STPD
EGP
考题
单选题A user wants to be permanently added to the dba group. Which of the following commands or processes can be used to accomplish this()A
chgrpB
chuserC
edit /etc/userD
edit /etc/security/group
考题
单选题Which of the following groups is BEST to assign to a home user to prevent software installation?()A
UsersB
AdministratorsC
Power UsersD
Remote Desktop Users
考题
单选题Which of the following statements is used to grant user TOM and Application team APPGRP the ability to add data to table TAB1?()A
GRANT ADD DATA ON TABLE tab1 TO GROUP tom appgrpB
GRANT INSERT TO USER tom, GROUP appgrp ON TABLE tab1C
GRANT INSERT ON TABLE tab1 TO USER tom, GROUP appgrpD
GRANT ADD DATA ON TABLE tab1 TO USER appgrp, GROUP tom
考题
单选题Which is the source used by Automatic SQL Tuning that runs as part of the AUTOTASK framework?()A
SQL statements that are part of the AWR baseline onlyB
SQL statements based on the AWR top SQL identificationC
SQL statements that are part of the available SQL Tuning Set (STS) onlyD
SQL statements that are available in the cursor cache and executed by a user other than SYS
考题
单选题Which of the following statements describes the functions of a reservoir used in a hydraulic system?()A
Dissipate heatB
Trap foreign matterC
Separate air from the oilD
All of the above
考题
单选题Which of the following statements is true regarding the VERSIONS BETWEEN clause?()A
The VERSIONS BETWEEN clause may be used in DML statements.B
The VERSIONS BETWEEN clause may be used in DDL statements.C
The VERSIONS BETWEEN clause may not be used to query past DDL changes to tables.D
The VERSIONS BETWEEN clause may not be used to query past DML statements to tables.
考题
多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can be used to control the time interval for which the access privilege is available to a user.DIt can be used to selectively restrict the access for each user in a database to different host computers.EIt can be used to selectively restrict a user's access to different applications in a specific host computer.
热门标签
最新试卷