网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You previously secured your listener with an encrypted password. However, you need to set a new password for security reasons. What is the correct method for setting a new encrypted password for the listener using the Listener Control utility?()
A
executing the SET PASSWORD command and then the SAVE_CONFIG command
B
executing the CHANGE_PASSWORD command and then the SAVE_CONFIG command
C
executing the CHANGE_PASSWORD command and then the SET PASSWORD command
D
executing the SET PASSWORD command, then the CHANGE_PASSWORD command and finally, the SAVE_CONFIG command
参考答案
参考解析
解析:
暂无解析
更多 “单选题You previously secured your listener with an encrypted password. However, you need to set a new password for security reasons. What is the correct method for setting a new encrypted password for the listener using the Listener Control utility?()A executing the SET PASSWORD command and then the SAVE_CONFIG commandB executing the CHANGE_PASSWORD command and then the SAVE_CONFIG commandC executing the CHANGE_PASSWORD command and then the SET PASSWORD commandD executing the SET PASSWORD command, then the CHANGE_PASSWORD command and finally, the SAVE_CONFIG command” 相关考题
考题
When it comes to placing an interest hook in your elevator pitch and making it more contagious, you should speak proudly about your story as the listener is experiencing it.()
考题
We would suggest that you()the carton with double straps.
A、will secureB、securingC、secureD、are secured
考题
Your database instance is running.You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.Which tool or utility would you use to start the listener?()
A. Oracle Net ManagerB. Listener Control utilityC. Database Configuration AssistantD. Oracle Net Configuration Assistant
考题
Your database is open and the LISTENER listener running. You stopped the wrong listener LISTENER byissuing the following command:lsnrctl >STOPWhat happens to the sessions that are presently connected to the database Instance?()A. They are able to perform only queries.B. They are not affected and continue to function normally.C. They are terminated and the active transactions are rolled back.D. They are not allowed to perform any operations until the listener LISTENER is started
考题
You work as a database administrator for Supportcenter.cn. When you tried to connect to the database, you received the following error: ERROR: ORA-12541:TNS:no_listener You found that the listener is not running on the server, so you issued the following command in the Listener Control utility to start the listener. lsnrctlSTART What statement is true?()A、It would attempt to start the default listenerB、It would start the most recently created listener.C、It would display an error with a message asking for the listener name to be specified.D、It would show you a list of listeners and prompts for the listener name that you want to start.
考题
You were recently hired by Certkiller .com as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()A、 by using the STATUS command of the Listener control utilityB、 by using the STATUS L1 command of the Listener control utilityC、 by using the SHOW RULES command of the Listener control utilityD、 by using the SET PASSWORD command of the Listener control utilityE、 by searching for the PASSWORD_LISTENER entry in the listener.ora file
考题
You are configuring the listener on your server. Which listener.ora parameter contains the information needed to detect session requests from different client types?()A、ADDRESS_LISTB、SID_NAMEC、LISTENERD、SERVICE_LIST
考题
You want your listener to be password protected to prevent it from being shut down. You want to accomplish this task while the listener is functional. Which method could you use to achieve this objective?()A、 Use the CHANGE_PASSWORD command of the Listener control utility.B、 Use the SET PASSWORD and SAVE_CONFIG commands of the Listener control utility.C、 Use the CHANGE_PASSWORD and SAVE_CONFIG commands of the Listener control utility.D、 Manually modify the listener.ora file to include the password for the listener and restart the listener.
考题
Your database instance is running. You are not able to access Oracle Enterprise Manager Database Control because the listener is not started. Which tool or utility would you use to start the listener?()A、 Oracle Net ManagerB、 Listener Control utilityC、 Database Configuration AssistantD、 Oracle Net Configuration Assistant
考题
You previously secured your listener with an encrypted password. However, you need to set a new password for security reasons. What is the correct method for setting a new encrypted password for the listener using the Listener Control utility?()A、 executing the SET PASSWORD command and then the SAVE_CONFIG commandB、 executing the CHANGE_PASSWORD command and then the SAVE_CONFIG commandC、 executing the CHANGE_PASSWORD command and then the SET PASSWORD commandD、 executing the SET PASSWORD command, then the CHANGE_PASSWORD command and finally, the SAVE_CONFIG command
考题
As the administrator of your company’s network, you have implemented encryption for extra security of data on your network. A user moves an encrypted file from an NTFS partition on her Windows 2000 Workstation to an NTFS folder on a remote Windows 2000 Server. What effect will this have on the encrypted file?()A、The encrypted file will automatically be decrypted.B、Encrypted files and folders cannot be moved or copied, decrypt it first then move or copy thefile or folder.C、The encrypted file will remain encrypted in the Windows 2000 folder.D、The encrypted file will inherit the encryption state of the remote NTFS folder.
考题
You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()A、Move the encrypted data to a folder on ATLFP2 over an IPSec connectionB、Move the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connectionC、Move the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2D、Move the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL
考题
单选题You want your listener to be password protected to prevent it from being shut down. You want to accomplish this task while the listener is functional. Which method could you use to achieve this objective?()A
Use the CHANGE_PASSWORD command of the Listener control utility.B
Use the SET PASSWORD and SAVE_CONFIG commands of the Listener control utility.C
Use the CHANGE_PASSWORD and SAVE_CONFIG commands of the Listener control utility.D
Manually modify the listener.ora file to include the password for the listener and restart the listener.
考题
单选题You work as a database administrator for Certkiller .com. When you tried to connect to the database, you received the following error: ERROR: ORA-12541:TNS:no_listener You found that the listener is not running on the server, so you issued the following command in the Listener Control utility to start the listener. lsnrctlSTART What statement is true?()A
It would attempt to start the default listenerB
It would start the most recently created listener.C
It would display an error with a message asking for the listener name to be specified.D
It would show you a list of listeners and prompts for the listener name that you want to start.
考题
单选题You have two listener processes, named L1 and L2. Both the listener processes are currently functional. While viewing the listener.ora file on your database server, you find the following entry: PASSWORDS_L1 = (1sanfrjp43) What would be the impact of this setting?()A
The listener process named L1 will disconnect the unauthorized users.B
The listener process named L1 will be prevented from being started by unauthorized users. C
The listener process named L1 will be prevented from being stopped by unauthorized users. D
The listener process named L1 will be prevented from being reloaded by unauthorized users.E
The listener process named L1 will be prevented from accepting connections from unauthorized users.
考题
单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A
Encrypt customer information when it is stored and when it is being transmittedB
Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC
Encrypt all marketing information on file servers and client computersD
Require encrypted connections to all file servers
考题
单选题You work as a database administrator for Certkiller .com. You enabled tracing while creating a listener to your database. What additional information is available to you when you enable tracing?()A
Information about each Oracle Net connection.B
Information about each entry in theLinstener.orafileC
Information about the changed done in the databaseD
Information about the different listeners in your systemE
Information about all thenondatabasefiles required to operate the database
考题
单选题Your database instance is running. You are not able to access Oracle Enterprise Manager Database Control because the listener is not started. Which tool or utility would you use to start the listener?()A
Oracle Net ManagerB
Listener Control utilityC
Database Configuration AssistantD
Oracle Net Configuration Assistant
考题
单选题Your database instance is running.You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.Which tool or utility would you use to start the listener?()A
Oracle Net ManagerB
Listener Control utilityC
Database Configuration AssistantD
Oracle Net Configuration Assistant
考题
单选题You are using a dialup connection. You want to ensure that your password is encrypted. What protocols from the list below would you disable? ()A
PAPB
SPAPC
MSCHAPD
MSCHAP V2
考题
单选题Your company uses a Windows 2008 Enterprise certificate authority (CA) to issue certificates. You need to implement key archival. What should you do()A
Archive the private key on the server.B
Apply the Hisecdc security template to the domain controllers.C
Configure the certificate for automatic enrollment for the computers that store encrypted files.D
Install an Enterprise Subordinate CA and issue a user certificate to users of the encrypted files.
考题
单选题You are configuring the listener on your server. Which listener.ora parameter contains the information needed to detect session requests from different client types?()A
ADDRESS_LISTB
SID_NAMEC
LISTENERD
SERVICE_LIST
考题
多选题You work as a database administrator for Certkiller .com. Your listener process, L1,is currently listening to three databases:CertK INDB04,Certkiller DB05 and Certkiller DB06. Using Database Configuration Assistant (DBCA) you create one more database,Certkiller DB07,and enable dynamic registration. Which two commands of Listener Control Utility (lsnrct1) would you use to determine whether the dynamic registration occurred for the database, Certkiller DB07, with the L1 listener process?()ASHOW L1BSPAWN L1CSTATUS L1DSERVICES L1ESTATUS LISTENERFSERVICES LISTENERGSHOWcurrent_listener
考题
单选题Your database is open and the LISTENER listener running. You stopped the wrong listener LISTENER byissuing the following command:lsnrctl STOPWhat happens to the sessions that are presently connected to the database Instance?()A
They are able to perform only queries.B
They are not affected and continue to function normally.C
They are terminated and the active transactions are rolled back.D
They are not allowed to perform any operations until the listener LISTENER is started
考题
单选题As the administrator of your company’s network, you have implemented encryption for extra security of data on your network. A user moves an encrypted file from an NTFS partition on her Windows 2000 Workstation to an NTFS folder on a remote Windows 2000 Server. What effect will this have on the encrypted file?()A
The encrypted file will automatically be decrypted.B
Encrypted files and folders cannot be moved or copied, decrypt it first then move or copy thefile or folder.C
The encrypted file will remain encrypted in the Windows 2000 folder.D
The encrypted file will inherit the encryption state of the remote NTFS folder.
考题
单选题While you are working in a space,the fixed CO2 system is accidentally activated.You should().A
Secure the applicators to preserve the charge in the cylindersB
Continue with your work as there is nothing you can do to stop the flow of CO2C
Retreat to fresh air and ventilate the compartment before returningD
Make sure all doors and vents are secured
热门标签
最新试卷