网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to protect the confidential data files on File2 against unauthorized offline access.   What should you use?()
A

Encrypting File System (EFS) on File2

B

file screens on Node1 and Node2

C

NTFS permissions on File2

D

Windows BitLocker Drive Encryption (BitLocker) on Node1 and Node2


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to protect the confidential data files on File2 against unauthorized offline access.   What should you use?()A Encrypting File System (EFS) on File2B file screens on Node1 and Node2C NTFS permissions on File2D Windows BitLocker Drive Encryption (BitLocker) on Node1 and Node2” 相关考题
考题 You are the network administrator for your company. The network contains a Windows Server 2003 computernamed Server1.Server1 contains two NTFS volumes named Data and Userfiles. The volumes are located on separate hard disks.The Data volume is allocated the drive letter D. The Data volume is shared as \\Server1\Data. The Userfiles volume is mounted on the Data volume as a volume mount point. The Userfiles volume is displayed as the D:\Userfiles folder when you view the local disk drives by using Windows Explorer on Server1. The D:\Userfiles folder is shared as \\Server1\Userfiles.The files on the Userfiles volume change every day. Users frequently ask you to provide them with previous versions of files. You enable and configure Shadow Copies on the Data volume. You schedule shadow copies to be created once a day. Users report that they cannot recover previous versions of files in the \\Server1\Userfiles shared folder.You need to enable users to recover previous versions of files on the Userfiles volume.What should you do? ()

考题 Members of Internet-based supply chains will need to evaluate their () and employ () and other electronic security tools to protect confidential data. A.security needsB.patentC.fireworkD.encryption technologies

考题 Members of Internet-based supply chains will need to evaluate their security needs and employ ()and other electronic security tools to protect confidential data. A、patentsB、passwordsC、telnetD、encryption technologies

考题 You are the administrator of a Windows 2000 network. The network includes a Windows 2000 Server computer that is used as a file server. More than 800 of Ezonexam.com's client computers are connected to this server.A shared folder named Data on the server is on an NTFS partition. The data folder contains more than 200 files. The permissions for the data folder are shown in the following table.Type of permission Account PermissionShare Users ChangeNTFS Users Full ControlYou discover that users are connected to the Data folder. You have an immediate need to prevent 10 of the files in the Data folder from being modified. You want your actions to have the smallest possible effects on the users who are using other files on the server.What two actions should you take? (Choose Two)A.Modify the NTFS permissions for the 10 files.B.Modify the NTFS permissions for the Data folder.C.Modify the shared permissions for the Data folder.D.Log off the users from the network.E.Disconnect the users from the Data folder.

考题 You are the administrator of a SQL Server 2000 computer. You are creating a data transformation services package. As the first step in this process, you need to load data from text files into a database table. These text files contain data on new stores that join your franchise. The text files list the data columns in the following format StoreID, StoreName, Address, City, State, PostalCode, ManagerID, StoreTypeID, FacilityID.The destination table is configured as shown in the exhibit.You want to load the data into the table as quickly as possible. What should you do?A.Use a Bulk Insert Task to read the data into a temporary table. Use an Execute SQL task to import the appropriate data into the destination table.B.Create and edit a format file to select the columns you want to import. Use a Bulk Insert Task, and then specify the format file to import the appropriate data into the destination table.C.Use a transform. data task to import the data. Use Microsoft ActiveX transformation scripts to write the appropriate data to the appropriate columns in the destination table.D.Create and edit a format file to select the columns you want to import. Use a transform. data task, and then specify the format file to import the appropriate data into the destination table.

考题 You delete content from a file named Speed.doc that is stored in the C:\Data folder. You edit 20 files in this folder over the next two days. You need to restore the version of the file that had the correct data. You also need to ensure that the other fiels in the folder remain unaffected.What should you do?()A.AB.BC.CD.D

考题 You need to back up the existing data on a computer before you install a new application. You also need to ensure that you are able to recover individual user files that are replaced or deleted during the installation.What should you do?()A.AB.BC.CD.D

考题 Your database is running In ARCIIIVELOG mode. One of the data files, USBRDATAOI. DBF, in the users tablespace is damaged and you need to recover the file until the point of failure. The backup for the data file is available.  Which three files would be used in the user-managed recovery process performed by the database administrator (DBA)?() A、 redo logsB、 control fileC、 temporary files of temporary tablespaceD、 the latest backup of only the damaged data fileE、 the latest backup of all the data files In the USERS tablespace

考题 You are using RMAN to perform a closed database backup of your database. You issue these RMAN commands: STARTUP MOUNT; BACKUP  FORMAT ’/BACKUP/df_%d_%s_%p.bus’  DATABASE filesperset = 2;  Which components are included in the backup?()A、Only the data files.B、Only the data files and the online logs.C、The data files, control files, and the online logs.D、The data files and control files, but not the online logs.

考题 Your multitenant container database (CDB) is running in ARCHIVELOG mode. You connect to the CDB RMAN. Examine the following command and its output: You execute the following command: RMAN BACKUP DATABASE PLUS ARCHIVELOG; Which data files will be backed up?()A、Data files that belong to only the root containerB、Data files that belong to the root container and all the pluggable databases (PDBs)C、Data files that belong to only the root container and PDB$SEEDD、Data files that belong to the root container and all the PDBs excluding PDB$SEED

考题 When performing an incomplete recover of the whole database, which data files must you restore? ()A、Only the damaged or lost data files.B、All of the data files of the database.C、Only the data files belonging to the SYSTEM tablespace.D、The data files belonging to the SYSTEM tablespace and the damaged or lost data files.

考题 You are using Oracle Database 10g. Which statement regarding an incomplete recovery is true?()A、 You do not need to restore all the data files.B、 You do not need to open the database with the RESETLOGS operationC、 You do not need to perform a full backup after the RESETLOGS operation.D、 You do not need to recover all the data files to the same system change number (SCN).

考题 You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.D、Disable all LM and NTLM authentication methods on TestKing1.E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

考题 Your company has a single active directory domain. All servers run windows server 2008. The company network has 10 servers that perform as web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network, you notice that the confidential files are stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()A、Deactivate all LM and NTLM authentication methods on the FSS1 server.B、Use IIS to publish the confidentials files. Activate SSL on the ISS server, and then open the files as a web folder.C、Use IPSec encryption between the FSS 1 server and the computers of the users who need to access the confidential files.D、Use the server messager block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.E、Activate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties dialog box, select the encrypt contents to secure data option.

考题 You delete content from a file named Speed.doc that is stored in the C:///Data folder. You edit 20 files in this folder over the next two days.  You need to restore the version of the file that had the correct data. You also need to ensure that the other files in the folder remain unaffected.  What should you do? ()A、From the Previous Versions tab, restore the version of the file that contains the correct data.B、Restore a version of the folder that contains the correct version of the file.C、Open a version of the folder that contains the correct version of the file.D、Copy a version of the folder that contains the correct version of the file. Replace the existing version of the folder with the older version.

考题 You need to protect the confidential data files on File2 against unauthorized offline access.   What should you use?()A、Encrypting File System (EFS) on File2B、file screens on Node1 and Node2C、NTFS permissions on File2D、Windows BitLocker Drive Encryption (BitLocker) on Node1 and Node2

考题 多选题Your company has a single Active Directory domain. All servers run Windows Server 2008. The company network has 10 servers that perform as Web servers. All confidential files are located on a server named  FSS1. The company security policy states that all confidential data must be transmitted in the most securemanner. When you monitor the network, you notice that the confidential files are stored on the FSS1 server are being transmitted over the network without encryption. You need to ensure taht encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal?()ADeactivate all LM and NTLM authentication methods on the FSS1 serverBUse IIS to publish the confidentials files. activate SSL on the ISS server, and then open the files as a web folder.CUse IPSec encryption between the FSS1 server and the computers of the users who need to access the confidential filesDUse the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.EActivate offline files for the confidential files that are stored on the FSS1 server. In the Folder Advanced.Properties dialog box, select the Encrypt contents to secure data option.

考题 单选题When performing an incomplete recover of the whole database, which data files must you restore? ()A Only the damaged or lost data files.B All of the data files of the database.C Only the data files belonging to the SYSTEM tablespace.D The data files belonging to the SYSTEM tablespace and the damaged or lost data files.

考题 单选题You are a security administrator for your company. The network consists of a single Active  Directory domain. All servers run Windows Server 2003. All client computers run Windows 2000 Professional.   You manage a Windows Server 2003 computer named Server1 that is a domain member server. You use IIS on Server1 to host an Internet Web site. Approximately 4,000 employees of your company connect over the lnternet to access company confidential data on Server1. You control access to data on Server1 by using NTFS file permissions assigned to groups. Different groups are assigned access to different files. Employees must have access only to files that they are assigned access to based on their membership in a group. You enable SSL on Server1 to protect confidential data while it is in transit. You issue each employee an Authenticated Session certificate and store a copy of that certificate with their user account in the Active Directory domain.    You need to ensure that Server1 authenticates users based on possession of their certificate.  What should you do?()A  Request a Web server certificate from a commercial certification authority (CA).B  Configure access restrictions based on employee ip address.C  Enable Digest authentication for Windows domain servers.D  Configure client certificate mapping.

考题 多选题Your database is running In ARCIIIVELOG mode. One of the data files, USBRDATAOI. DBF, in the users tablespace is damaged and you need to recover the file until the point of failure. The backup for the data file is available.  Which three files would be used in the user-managed recovery process performed by the database administrator (DBA)?()Aredo logsBcontrol fileCtemporary files of temporary tablespaceDthe latest backup of only the damaged data fileEthe latest backup of all the data files In the USERS tablespace

考题 单选题You are operating your database in NOARCHIVELOG mode. Your most recent backup includes a copy of all of the data files and the control files taken when the current log sequence number was 45. You experience disk failure on the drive on which your SYSTEM tablespace data files are stored. At the time of the failure, the current log sequence number is 98. Which files should you restore to recover from the loss of the SYSTEM tablespace data files?()A Only the data files.B All of the data files and the control files.C Only the data files belonging to the SYSTEM tablespace.D Only the data files belonging to the SYSTEM tablespace and the control files.

考题 多选题Your company has a single active directory domain. All servers run windows server 2008. The company network has servers that perform as web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network you notice that the confidential files stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()ADeactivate all LM and NTLM authentication methods on FSS1 server.BUse IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folder.CUse IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.DUse the server message block (SMB) signing between the FSS1 serve and the computers of the users who want to access the confidential files.EActivate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties box, select the encrypt contents to secure data option.

考题 单选题You are using Oracle Database 10g. Which statement regarding an incomplete recovery is true?()A  You do not need to restore all the data files.B  You do not need to open the database with the RESETLOGS operationC  You do not need to perform a full backup after the RESETLOGS operation.D  You do not need to recover all the data files to the same system change number (SCN).

考题 单选题You need to recover five data files that are spread across multiple disks. Which initialization parameter should you set to speed up redo application?()A RECOVERY_PARALLELISMB FAST_START_MTTR_TARGETC LOG_CHECKPOINT_INTERVALD FAST_START_PARALLEL_ROLLBACK

考题 多选题Your company has a single Active Directory domain. All servers run Windows Server 2008. The company network has servers that perform as Web Servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network you notice that the confidential files stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always usedwhen the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()ADeactivate all LM and NTLM authentication methods on FSS1 serverBUse IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folderCUse IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.DUse the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.EActivate offline files for the confidential files that are stored on the FSS1 server. In the Folder avanced Properties box, select the Encrypt contents to secure data optiion

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Confidential files are stored on a member server named TK1. The computer object for TK1 resides in an organizational unit (OU) named Confidential. A Group Policy object (GPO) named GPO1 is linked to the Confidential OU. To audit access to the confidential files, you enable auditing on all private folders on TK1. Several days later, you review the audit logs. You discover that auditing is not successful. You need to ensure that auditing occurs successfully. What should you do?()A Start the System Event Notification Service (SENS) on TK1.B Start the Error Reporting service on TK1.C Modify the Default Domain Controllers GPO by selecting Success and Failure as the Audit Object Access setting.D Modify GPO1 by selecting Success and Failure as the Audit Object Access setting.

考题 单选题In Recovery Manager (RMAN), you are taking image copies of the data files of your production database and rolling them forward at regular intervals. You attempt to restart your database. After a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the data file by using the image copy. Because a media failure caused the data file to be damaged, you want to place the data file in a different location while restoring the file. Which option must you consider for this task?()A using only the RMAN SWITCH command to set the new location for the data fileB placing the database in the MOUNT state for the restore and recovery operations.C using an RMAN RUN block with the SET NEWNAME and then the SWITCH command.D configuring two channels: one for the restore operation and the other for the recovery operation

考题 单选题You need to back up the existing data on a computer before you install a new application. You also need to ensure that you are able to recover individual user files that are replaced or deleted during the installation.  What should you do?()A Create a System Restore point.B Perform an Automated System Recovery (ASR) backup and restore.C In the Backup and Restore Center window, click the Back up files button.D In the Backup and Restore Center window, click the Back up computer button.