网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
To determine whether a particular file has a virus by only inspecting a few initial packets before receiving the entire file, which UTM feature do you enable?()
A

URL white lists

B

intelligent pre-screening

C

trickling

D

scan mode extensions


参考答案

参考解析
解析: 暂无解析
更多 “单选题To determine whether a particular file has a virus by only inspecting a few initial packets before receiving the entire file, which UTM feature do you enable?()A URL white listsB intelligent pre-screeningC tricklingD scan mode extensions” 相关考题
考题 You have enabled backup optimization for the RMAN environment.Identify two criteria on which RMAN will skip the file, if it has already been backed up.() A. The data file backup is done with multiple channelsB. The data files is in the read-write mode after being backed up in the read only modeC. The backup was taken after the data files was taken offline-normal or is in the read only modeD. The data file backup complies with the back retention policy and the backup duplexing feature

考题 You have not configured Oracle Managed Files (OMF) in your database. You do not want to scan the entire datafile every time an incremental backup is performed. You decide to enable the block change tracking feature. Which statement should you use to enable the block change tracking feature?()A. ALTER DATABASE ENABLE BLOCK CHANGE TRACKING;B. ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING USING FILE path;C. ALTER DATABASE ENABLE BLOCK CHANGE TRACKING USING FILE path;D. ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING;

考题 You have enabled backup optimization for the RMAN environment. Identify two criteria on which RMAN will skip the file, if it has already been backed up.() (Choose two.) A. The data file backup is done with multiple channelsB. The data files is in the read-write mode after being backed up in the read only modeC. The backup was taken after the data files was taken offline-normal or is in the read only modeD. The data file backup complies with the back retention policy and the backup duplexing feature

考题 To determine whether a particular file has a virus by only inspecting a few initial packets before receiving the entire file, which UTM feature do you enable?() A. URL white listsB. intelligent pre-screeningC. tricklingD. scan mode extensions

考题 Which command do you use to display the status of an antivirus database update?() A. show security utm anti-virus statusB. show security anti-virus database statusC. show security utm anti-virus databaseD. show security utm anti-virus update

考题 Certkiller .com has asked you to create a file management application to monitor the hosts file.Certkiller .com has instructed you to change the hosts file if it has been changed.You, therefore, need to display the size and whether the hosts file is set to read-only.What should you do?()A.B.C.D.

考题  You created a custom menu for the Order Entry application. Which step do you perform before attaching the menu module to the form module?()A、Select file--Administration--Convert B、Select file--Administration--Execute C、Select file--Administration--Compile FileD、No further step is necessary. 

考题 You have enabled backup optimization for the RMAN environment.Identify two criteria on which RMAN will skip the file, if it has already been backed up.()A、The data file backup is done with multiple channelsB、The data files is in the read-write mode after being backed up in the read only modeC、The backup was taken after the data files was taken offline-normal or is in the read only modeD、The data file backup complies with the back retention policy and the backup duplexing feature

考题 Which command do you use to display the status of an antivirus database update?()A、show security utm anti-virus statusB、show security anti-virus database statusC、show security utm anti-virus databaseD、show security utm anti-virus update

考题 To determine whether a particular file has a virus by only inspecting a few initial packets before receiving the entire file, which UTM feature do you enable?()A、URL white listsB、intelligent pre-screeningC、tricklingD、scan mode extensions

考题 You have not configured Oracle Managed Files (OMF) in your database. You do not want to scan the entire datafile every time an incremental backup is performed. You decide to enable the block change tracking feature. Which statement will you use to enable the block change tracking feature?()A、 ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING;B、 ALTER DATABASE ENABLE BLOCK CHANGE TRACKING;C、 ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING USING FILE ;D、 ALTER DATABASE ENABLE BLOCK CHANGE TRACKING USING FILE ;

考题 In which case would you use the Flashback Database feature to perform a recovery?()A、to recover a dropped tablespaceB、to recover data from a truncated tableC、to recover a data file that has been shrunkD、to recover a database to the state that existed before the RESETLOGS operation

考题 You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database.  Which method would you use to recover the data file?()A、Restore all the data files and open the databaseB、Create the data file and performtablespacerecoveryC、No need to restore any file, just recover the databaseD、Restore only the system data file and recover the databaseE、Restore only lost date file and performtablespacerecovery

考题 You have enabled backup optimization for the RMAN environment. Identify two criteria on which RMAN will skip the file, if it has already been backed up.()A、 The data file backup is done with multiple channelsB、 The data files is in the read-write mode after being backed up in the read only modeC、 The backup was taken after the data files was taken offline-normal or is in the read only modeD、 The data file backup complies with the back retention policy and the backup duplexing fe ture

考题 Your company has file servers located in an organizational unit named Payroll. The file servers  contain payroll files located in a folder named Payroll.     You create a GPO. You need to track which employees access the Payroll files on the file  servers.   What should you do()    A、Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file servers, configureB、Enable the Audit object access option. Link the GPO to the domain. On the domain controllers, configure Auditing fC、Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit. On the file seD、Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file servers, config

考题 Your portable computer has two 512-MB memory modules installed in the only two memory slots available.  You need to improve the speed of your computer.  What should you do? ()A、Adjust the processor scheduling to optimize for background services.B、Connect a USB flash drive to the computer. Enable the ReadyBoost feature.C、Configure the virtual memory file to exist on the same drive as the operating system.D、Configure the local security policy setting of the computer to clear the virtual page file upon shutdown.

考题 You are the network administrator for Company.com.  Your Windows 2000 Professional computer has 128 MB of RAM and two physical hard disks. Each hard disk has a single partition configured as drive C and D. Each partition has more than 500 MB of free disk space. Windows 2000 Professional and all applications are installed on drive C. You frequently run two or more memory-intensive graphics applications simultaneously. You notice that access to drive C is much slower when you are using the graphics applications. You want to maximize overall disk performance for your computer.   What should you do?()A、Configure the paging file to reside on drive C onlyB、Configure the paging file to reside on drive D onlyC、Configure the initial size of the paging file and the maximum size of paging file to 64 MBD、Configure the initial size of the paging file and the maximum size of the paging file to 128 MBE、Configure the initial size of the paging file and the maximum size of the paging file to 256 MB

考题 You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. contains a shared folder named TestKingProjects. You use the Backup utility once each day to back up the TestKingProjects folder. You discover that a database file in the TestKingProjects folder is corrupt. You confirm that the file corruption is not the result of a virus. You need to replace the corrupted file by using the latest backup. You do not know whether the file was corrupted before or after the latest backup was completed. You need to verify that the file in the backup can be opened successfully before you overwrite the existing file. What should you do?()A、In the Backup utility, select the Verify data after backup option.B、Run the Ntbackup //TestKing2/TestKingProjects /v:yes command.C、Restore the file to a temporary folder. Verify that the database file contains the correct data. Copy the restored file to the TestKingProjects folder.D、Restore the file to a temporary folder. Use the Windiff utility to compare the file in the temporary folder to the file in the TestKingProjects folder. Copy the restored file to the TestKingProjects folder.

考题 单选题You have not configured Oracle Managed Files (OMF) in your database. You do not want to scan the entire datafile every time an incremental backup is performed. You decide to enable the block change tracking feature. Which statement should you use to enable the block change tracking feature?()A ALTER DATABASE ENABLE BLOCK CHANGE TRACKING;B ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING USING FILE path;C ALTER DATABASE ENABLE BLOCK CHANGE TRACKING USING FILE path;D ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING;

考题 单选题You have not configured Oracle Managed Files (OMF) in your database. You do not want to scan the entire datafile every time an incremental backup is performed. You decide to enable the block change tracking feature.Which statement should you use to enable the block change tracking feature?()A ALTER DATABASE ENABLE BLOCK CHANGE TRACKINGB ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING USING FILE C ALTER DATABASE ENABLE BLOCK CHANGE TRACKING USING FILE D ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING

考题 单选题You work as a database administrator for Supportcenter.cn. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database. Which method would you use to recover the data file?()A Restore all the data files and open the databaseB Create the data file and perform tablespace recoveryC No need to restore any file, just recover the databaseD Restore only the system data file and recover the databaseE Restore only lost date file and performtablespacerecovery

考题 多选题You are the network administrator for Company.com.  Your Windows 2000 Professional computer has 128 MB of RAM and two physical hard disks. Each hard disk has a single partition configured as drive C and D. Each partition has more than 500 MB of free disk space. Windows 2000 Professional and all applications are installed on drive C. You frequently run two or more memory-intensive graphics applications simultaneously. You notice that access to drive C is much slower when you are using the graphics applications. You want to maximize overall disk performance for your computer.   What should you do?()AConfigure the paging file to reside on drive C onlyBConfigure the paging file to reside on drive D onlyCConfigure the initial size of the paging file and the maximum size of paging file to 64 MBDConfigure the initial size of the paging file and the maximum size of the paging file to 128 MBEConfigure the initial size of the paging file and the maximum size of the paging file to 256 MB

考题 单选题Your portable computer has two 512-MB memory modules installed in the only two memory slots available.  You need to improve the speed of your computer.  What should you do? ()A Adjust the processor scheduling to optimize for background services.B Connect a USB flash drive to the computer. Enable the ReadyBoost feature.C Configure the virtual memory file to exist on the same drive as the operating system.D Configure the local security policy setting of the computer to clear the virtual page file upon shutdown.

考题 单选题Which command do you use to display the status of an antivirus database update?()A show security utm anti-virus statusB show security anti-virus database statusC show security utm anti-virus databaseD show security utm anti-virus update

考题 单选题In which case would you use the Flashback Database feature to perform a recovery?()A to recover a dropped tablespaceB to recover data from a truncated tableC to recover a data file that has been shrunkD to recover a database to the state that existed before the RESETLOGS operation

考题 单选题To determine whether a particular file has a virus by only inspecting a few initial packets before receiving the entire file, which UTM feature do you enable?()A URL white listsB intelligent pre-screeningC tricklingD scan mode extensions

考题 单选题You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. contains a shared folder named TestKingProjects. You use the Backup utility once each day to back up the TestKingProjects folder. You discover that a database file in the TestKingProjects folder is corrupt. You confirm that the file corruption is not the result of a virus. You need to replace the corrupted file by using the latest backup. You do not know whether the file was corrupted before or after the latest backup was completed. You need to verify that the file in the backup can be opened successfully before you overwrite the existing file. What should you do?()A In the Backup utility, select the Verify data after backup option.B Run the Ntbackup //TestKing2/TestKingProjects /v:yes command.C Restore the file to a temporary folder. Verify that the database file contains the correct data. Copy the restored file to the TestKingProjects folder.D Restore the file to a temporary folder. Use the Windiff utility to compare the file in the temporary folder to the file in the TestKingProjects folder. Copy the restored file to the TestKingProjects folder.

考题 单选题You created a custom menu for the Order Entry application. Which step do you perform before attaching the menu module to the form module?()A Select file--Administration--Convert B Select file--Administration--Execute C Select file--Administration--Compile FileD No further step is necessary.