网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Examine the code:   CREATE ROLE readonly IDENTIFIES USING app.chk_readwrite ; CREATE ROLE readwrite IDENTIFIED USING app.chk_readwrite ;   CREATE OR REPLACE PROCEDURE app.chk_readwrite  AUTHID CURRENT_USER IS  ipchk STRING(30);  BEGIN  IF sys_context(‘USERENV’,’ISDBA’)=’TRUE’  THEN DBMS_SESSION.SET_ROLE‘READWRITE’) ;  ELSE DBMS_SESSION.SET_ROLE(‘READONLY’) ;  END; /   Which three statements correctly describe the Secure Application role definition?()
A

No user or application has to remember or hide a password.

B

It prevents everyone except a true DBA session from acquiring the READWRITE role.

C

app.chk_readwrite is called whenever a user tries to access rows protected by the READONLY or READWRITE label.

D

app.chk_readwrite is called by users or applications when they want to enable the READONLY or READWRITE role.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Examine the code:   CREATE ROLE readonly IDENTIFIES USING app.chk_readwrite ; CREATE ROLE readwrite IDENTIFIED USING app.chk_readwrite ;   CREATE OR REPLACE PROCEDURE app.chk_readwrite  AUTHID CURRENT_USER IS  ipchk STRING(30);  BEGIN  IF sys_context(‘USERENV’,’ISDBA’)=’TRUE’  THEN DBMS_SESSION.SET_ROLE‘READWRITE’) ;  ELSE DBMS_SESSION.SET_ROLE(‘READONLY’) ;  END; /   Which three statements correctly describe the Secure Application role definition?()ANo user or application has to remember or hide a password.BIt prevents everyone except a true DBA session from acquiring the READWRITE role.Capp.chk_readwrite is called whenever a user tries to access rows protected by the READONLY or READWRITE label.Dapp.chk_readwrite is called by users or applications when they want to enable the READONLY or READWRITE role.” 相关考题
考题 You need to perform these tasks:1. Create and assign a MANAGER role to Blake and Clark2. Grant CREATE TABLE and CREATE VIEW privileges to Blake and ClarkWhich set of SQL statements achieves the desired results? ()A. CREATE ROLE manager; GRANT create table, create view TO manager; GRANT manager TO BLACK, CLARK;B. CREATE ROLE manager; GRANT create table, create voew TO manager; GRANT manager ROLE TO BLACK, CLARK;C. GRANT manager ROLE TO BLACK, CLARK; GRANT create table, create voew TO BLACK CLARK; ***MISSING***

考题 Which statement creates a new user? () A. CREATIVE USER susan;B. CREATIVE OR REPLACE USER susan;C. CREATE NEW USER susan DEFAULTD. CREATE USER susan IDENTIFIED BY blue;E. CREATE NEW USER susan IDENTIFIED BY blue;F. CREATE OR REPLACE USER susan IDENTIFIED BY blue;

考题 Which statement creates a new user?()A、CREATE USER susan;B、CREATE OR REPLACE USER susan;C、CREATE NEW USER susan DEFAULT;D、CREATE USER susan IDENTIFIED BY blue;E、CREATE NEW USER susanIDENTIFIED by blue;F、CREATE OR REPLACE USER susan IDENTIFIED BY blue;

考题 A storage specialist needs to create a new host connection using the DSCLI.  Which of the following parameters identifies the host()A、hosttypeB、volume groupC、ioportsD、WWPN

考题 Which procedure should be used to configure the system to prevent all users from using the ’at’ command()?  A、Create a /var/adm/cron/at.allow file with no entriesB、Create a /var/adm/cron/at.deny file with ’*’ as the only entryC、Create a /var/adm/at/at.deny file with ’ALL’ as the only entryD、Create a /var/adm/at/at.allow file with ’NONE’ as the only entry

考题 You want to schedule a job to rebuild all indexes on the SALES table after the completion of a bulk load operation. The bulk load operation must also be a scheduled job that executes as soon as the first file that contains data arrives on the system. How would you create these jobs?()A、Create both jobs by using events raised by the schedulerB、Create both jobs by using events raised by the applicationC、Create a job to rebuild indexes by using events arised by the application and then create another job to perform bulk load by using events raised by the schedulerD、Create a job to rebuild indexes by using events arised by the Scheduler and then create another job to perform bulk load by using events raised by the application

考题 You want to create a role to meet these requirements:  1:The role is to be protected from unauthorized usage.  2:The password of the role is not to be embedded in the application source code or stored in a table.  Which method would you use to restrict enabling of such roles()A、Create the role with global authentication.B、Create the role with external authentication.C、Create the role as a secure application role.D、Create the role as a password-protected role.E、Create a role and use Fine-Grained Access Control (FGAC) to secure the role.

考题 When should you create a role? ()A、To simplify the process of creating new users using the CREATE USER xxx IDENTIFIED by yyy statement.B、To grant a group of related privileges to a user.C、When the number of people using the database is very high.D、To simplify the process of granting and revoking privileges.E、To simplify profile maintenance for a user who is constantly traveling.

考题 Which statement creates a new user?()A、CREATIVE USER susan;B、CREATIVE OR REPLACE USER susan;C、CREATE NEW USER susan DEFAULTD、CREATE USER susan IDENTIFIED BY blue;E、CREATE NEW USER susan IDENTIFIED BY blue;F、CREATE OR REPLACE USER susan IDENTIFIED BY blue;

考题 You perform a backup using the following BACKUP command: RMAN BACKUP AS COMPRESSED BACKUPSET DATABASE,Which statement is true of this command?()A、A different procedure is required to restore a database from compressed backups B、The AS COMPRESSED clause of the BACKUP command provided by RMAN is used to create compressed backup sets and image copies. C、Using this command to create backups minimizes the bandwidth consumed.D、Using this command to create backups improves the performance of the backup process 

考题 You need to perform these tasks: 1. Create and assign a MANAGER role to Blake and Clark 2. Grant CREATE TABLE and CREATE VIEW privileges to Blake and Clark Which set of SQL statements achieves the desired results? ()A、CREATE ROLE manager; GRANT create table, create view TO manager; GRANT manager TO BLACK, CLARK;B、CREATE ROLE manager; GRANT create table, create voew TO manager; GRANT manager ROLE TO BLACK, CLARK;C、GRANT manager ROLE TO BLACK, CLARK; GRANT create table, create voew TO BLACK CLARK; ***MISSING***

考题 You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()A、Create the role with external authentication.B、Create the role as a secure application role.C、Create the role as a password-protected role.D、Create a role and use Fine-Grained Access Control (FGAC) to secure the role

考题 Which two statements accurately describe a role?()A、A role can be given to a maximum of 1000 users.B、A user can have access to a maximum of 10 roles.C、A role can have a maximum of 100 privileges contained in it.D、Privileges are given to a role by using the CREATE ROLE statement.E、A role is a named group of related privileges that can be granted to the user.F、A user can have access to several roles, and several users can be assigned the same role.

考题 Examine the commands executed in the following sequence:  1:SQL CREATE ROLE mgrrole;  2:SQL GRANT create user,select any table,connect,resource TO mgrrole;  3:SQL GRANT select,update ON sh.sales TO mgrrole;  4:SQL CREATE ROLE ceo IDENTIFIED BY boss;  5:SQL GRANT mgrrole,drop any table,create any directory TO ceo;  6:SQL GRANT ceo TO mgrrole;  Which statement is true about the above commands()A、The commands execute successfully.B、Command 6 produces an error because of circular role grant.C、Command 5 produces an error because a role cannot be granted to another role.D、Command 3 produces an error because the MGRROLE role already contains system privileges.E、The table created by HR remains and HR still has the CREATE TABLE system privilege.F、The table created by HR remains and HR can grant the CREATE TABLE system privilege to other users.

考题 You perform a backup using the following BACKUP command:   RMAN BACKUP AS COMPRESSED BACKUPSET DATABASE;   Which statement is true of this command?()  A、 A different procedure is required to restore a database from compressed backupsB、 The AS COMPRESSED clause of the BACKUP command provided by RMAN is used to create compressed  backup sets and image copies.C、 Using this command to create backups minimizes the bandwidth consumedD、 Using this command to create backups improves the performance of the backup process

考题 Examine the code:   CREATE ROLE readonly IDENTIFIES USING app.chk_readwrite ; CREATE ROLE readwrite IDENTIFIED USING app.chk_readwrite ;   CREATE OR REPLACE PROCEDURE app.chk_readwrite  AUTHID CURRENT_USER IS  ipchk STRING(30);  BEGIN  IF sys_context(‘USERENV’,’ISDBA’)=’TRUE’  THEN DBMS_SESSION.SET_ROLE‘READWRITE’) ;  ELSE DBMS_SESSION.SET_ROLE(‘READONLY’) ;  END; /   Which three statements correctly describe the Secure Application role definition?()A、No user or application has to remember or hide a password. B、It prevents everyone except a true DBA session from acquiring the READWRITE role. C、app.chk_readwrite is called whenever a user tries to access rows protected by the READONLY or READWRITE label. D、app.chk_readwrite is called by users or applications when they want to enable the READONLY or READWRITE role.

考题 .Your companys virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to provide a user with the ability to perform only the Create, Delete, Start, Stop, Pause, Resume, and Shut Down virtual machine (VM) management tasks on your host servers .  What should you do?()A、In VMM,create a Self-Service user role.B、In VMM,create a Delegated Administrator user role.C、In VMM,assign the Local Administrator permission for the host servers to the user.D、In Authorization Manager, create a role on the users client computer and add the user to this role.

考题 You need to call an unmanaged function from your managed code by using platform invoke services. What should you do?()A、Create a class to hold DLL functions and then create prototype methods by using managed code.B、Register your assembly by using COM and then reference your managed code from COMC、Export a type library for your managed code.D、Import a type library as an assembly and then create instances of COM object.

考题 You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. Developers are members of an AD security group named  Development. You need to ensure that on a specific host server, members of the Development group can perform only the Create,Modify,and Remove VM management tasks. What should you do?()A、Create a Self-Service user role and add the Development group to this role.B、Create a Delegated Administrator user role and add the Development group to this role.C、In Authorization Manager, create a role on the client computer of each member of the Development group, and add the Development group to this role.D、Install Hyper-V Manager on the client computer of each member of the Development group,and grant the Development group administrative privileges on the specific server.

考题 Your company has an Active Directory Domain Services (AD DS) domain. You have a Windows Server 2008 R2 Hyper-V server. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to ensure that a user can create new virtual machines (VMs) on only a specific set of servers . The user must not be able to see or manage servers outside of that set within VMM . Which two actions should you perform?()A、Create a host group. Add the host servers that the user will manage to the host group.B、Create a failover cluster. Join the host servers that the user will manage to the failover cluster.C、Using Authorization Manager, assign the user to a role with the necessary permission to manage the servers by using VMM.D、Using Authorization Manager, assign the user to a role with the necessary permission to manage the servers by using the VMM Self-Service Portal.

考题 Your company has a main office and a branch office.The branch office administrators are the only members of a custom management role group.The role group is configured to allow members to manage recipients. You notice that the branch office administrators can manage recipients in both offices.You need to ensure that the branch office administrators can manage recipients in the branch office only. What should you do?()A、Create and associate a management scope to the role group.B、Create and associate a management role assignment policy to the role group.C、Create a new linked role group, and then add the branch office administrators to the role group.D、Create a new role, and then add management role entries to the role.

考题 单选题You need to perform these tasks: 1. Create and assign a MANAGER role to Blake and Clark 2. Grant CREATE TABLE and CREATE VIEW privileges to Blake and Clark Which set of SQL statements achieves the desired results?()A CREATE ROLE manager; GRANT create table, create view TO manager; GRANT manager TO BLACK, CLARK;B CREATE ROLE manager; GRANT create table, create voew TO manager; GRANT manager ROLE TO BLACK, CLARK;C GRANT manager ROLE TO BLACK, CLARK; GRANT create table, create voew TO BLACK CLARK; ***MISSING***

考题 单选题In your multitenant container database (CDB) containing pluggable database (PDBs), the HR user executes the following commands to create and grant privileges on a procedure: CREATE OR REPLACE PROCEDURE create_test_v (v_emp_id NUMBER, v_ename VARCHAR2,v_SALARY NUMBER, v_dept_id NUMBER) BEGIN INSERT INTO hr.test VALUES (V_emp_id, V_ename, V_salary, V_dept_id); END; / GRANT EXECUTE ON CREATE_TEST TO john, jim, smith, king; How can you prevent users having the EXECUTE privilege on the CREATE_TEST procedure from inserting values into tables on which they do not have any privileges?()A Create the CREATE_TEST procedure with definer’s rights.B Grant the EXECUTE privilege to users with GRANT OPTION on the CREATE_TEST procedure.C Create the CREATE_TEST procedure with invoker’s rights.D Create the CREATE_TEST procedure as part of a package and grant users the EXECUTE privilege the package.

考题 多选题Which two statements accurately describe a role?()AA role can be given to a maximum of 1000 users.BA user can have access to a maximum of 10 roles.CA role can have a maximum of 100 privileges contained in it.DPrivileges are given to a role by using the CREATE ROLE statement.EA role is a named group of related privileges that can be granted to the user.FA user can have access to several roles, and several users can be assigned the same role.

考题 单选题You need to perform these tasks: 1. Create and assign a MANAGER role to Blake and Clark 2. Grant CREATE TABLE and CREATE VIEW privileges to Blake and Clark Which set of SQL statements achieves the desired results? ()A CREATE ROLE manager; GRANT create table, create view TO manager; GRANT manager TO BLACK, CLARK;B CREATE ROLE manager; GRANT create table, create voew TO manager; GRANT manager ROLE TO BLACK, CLARK;C GRANT manager ROLE TO BLACK, CLARK; GRANT create table, create voew TO BLACK CLARK; ***MISSING***

考题 多选题When should you create a role? ()ATo simplify the process of creating new users using the CREATE USER xxx IDENTIFIED by yyy statement.BTo grant a group of related privileges to a user.CWhen the number of people using the database is very high.DTo simplify the process of granting and revoking privileges.ETo simplify profile maintenance for a user who is constantly traveling.

考题 单选题You need to call an unmanaged function from your managed code by using platform invoke services. What should you do?()A Create a class to hold DLL functions and then create prototype methods by using managed code.B Register your assembly by using COM and then reference your managed code from COMC Export a type library for your managed code.D Import a type library as an assembly and then create instances of COM object.