网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
- A、The database user must be created using DB2 Control Center.
- B、The database user must be created using the DB2 Command Line Processor.
- C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.
- D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.
参考答案
更多 “Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、The database user must be created using DB2 Control Center.B、The database user must be created using the DB2 Command Line Processor.C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.” 相关考题
考题
In your multitenant container database (CDB) containing same pluggable databases (PDBs), you execute the following commands in the root container:Which two statements are true?()
A. The C # # ROLE1 role is created in the root database and all the PDBs.B. The C # # ROLE1 role is created only in the root database because the container clause is not used.C. Privileges are granted to the C##A_ADMIN user only in the root database.D. Privileges are granted to the C##A_ADMIN user in the root database and all PDBs.E. The statement for granting a role to a user fails because the CONTAINER clause is not used.
考题
Examine the following impdp command to import a database over the network from a pre-12c Oracledatabase (source): Which three are prerequisites for successful execution of the command?()
A. The import operation must be performed by a user on the target database with the DATAPUMP_IMP_FULL_DATABASE role, and the database link must connect to a user on the source database with the DATAPUMP_EXD_FULL_DATABASE role.B. All the user-defined tablespaces must be in read-only mode on the source database.C. The export dump file must be created before starting the import on the target database.D. The source and target database must be running on the same platform with the same endianness.E. The path of data files on the target database must be the same as that on the source database.F. The impdp operation must be performed by the same user that performed the expdp operation.
考题
Which of the following is a characteristic of a schema?()
A.Foreign key references cannot cross schema boundaries.B.A DB2 user must be created before a schema with the same name can be created.C.If no schema is specified when an object is created, the default schema PUBLIC is used.D.A schema enables the creation of multiple objects in a database without encountering namespace collisions.
考题
Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()
A.REVOKE ACCESS ON DATABASE FROM USER bobB.REVOKE CONNECT ON DATABASE FROM USER tomC.REVOKE tom FROM ACCESS ON DATABASE BY USER bobD.REVOKE tom FROM CONNECT ON DATABASE BY USER bob
考题
When using the Tivoli Dynamic Workload Console, which monitor tasks are available to the user?()A、 all those that have been created by all usersB、 just those created by the user in the current sessionC、 all those created by the user and shared with user’s login groupD、 just those where the connection engine specifies the user’s logon
考题
Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、to add second factor based authentication to a Web applicationB、to pre-populate user wallets with all their application credentials in one goC、to enhance out-of-the-box audit logging by creating custom audit log eventsD、to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnE、to configure automatic password change on expiry for an application so that the new password is a random string of specified strength
考题
Which step do you need to perform to enable a user with the SYSDBA privilege to log in as SYSDBA in iSQL*Plus?()A、The user must be granted the database administrator (DBA) privilege.B、The user must be listed in the password file for the authentication.C、No special setup is needed for the user to connect as SYSDBA in iSQL*Plus.D、Set up a user in the Oracle Application Server Containers for J2EE (OC4J) user manager,and grant the webDba role to the user.
考题
In your database instance, the user sessions are connected to the database server from the remote machines.You want to achieve the following for these users: 1. The user account must be locked after four unsuccessful login attempts. 2. The user must be prompted to change the password at regular intervals. 3. The user may not have more than three simultaneous sessions. 4. The user session must automatically be logged off if more than 10 minutes elapsed time used. How would you accomplish the above()A、By assigning profiles for the usersB、By implementing Fine-Grained Auditing (FGA)C、By granting a secure application role to the usersD、By implementing the Database Resource Manager plan
考题
You are working on a 24X7 database. You want to design a backup strategy for your database that uses user managed backups. You want to be able to perform all backups while the database remains online. Which statement about performing user-managed backups in a 24x7 environment is true?()A、You must have change tracking enabled in your databaseB、Your database must be running in NOARCHIVELOG modeC、To back up a tablespace, it must be in backup modeD、To back up a tablespace, it must first be taken offline
考题
You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()A、The user cannot use the role at all.B、The role would not be granted to the user.C、The user needs to enable the role explicitly.D、The user can start using the role immediately.E、The user would have the admin option for the role.
考题
A web application uses the HttpSession mechanism to determine if a user is “logged in”. When a user supplies a valid user name and password, an HttpSession is created for that user. The user has access to the application for only 15 minutes after logging in. The code must determine how long the user has been logged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()A、 getCreationTimeB、 invalidateAfterC、 getLastAccessedTimeD、 getMaxInactiveInterval
考题
What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()A、The directory must exist with one subdirectory (general).B、The directory must exist with two subdirectories (daily, weekly).C、The directory must exist with three subdirectories (daily, weekly, monthly).D、The directory must exist with four subdirectories (general, daily, weekly, monthly).
考题
Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A、REVOKE ACCESS ON DATABASE FROM USER bobB、REVOKE CONNECT ON DATABASE FROM USER tomC、REVOKE tom FROM ACCESS ON DATABASE BY USER bobD、REVOKE tom FROM CONNECT ON DATABASE BY USER bob
考题
The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()A、The user would not be able to log in to the wallet.B、The user is able to log in with their wallet password, but the wallet is not synchronized with the server.C、A user must be re-assigned to another policy template in order to change any aspects of the applied policy.D、The user experiences normal operation, but AccessAgent will be unable to store newly captured passwords.
考题
Which statement is true about the database and database-user used during installation of IMS Server?()A、A preexisting database user may be used but a new database has to be created during installation.B、A preexisting database may be used but a new database user has to be created during installation.C、A preexisting database and user may be used or a new database and user are created during installation.D、A preexisting database and user cannot be used; a new database and user are created during installation.
考题
Which of the following is a characteristic of a schema?()A、Foreign key references cannot cross schema boundaries.B、A DB2 user must be created before a schema with the same name can be created.C、If no schema is specified when an object is created, the default schema PUBLIC is used.D、A schema enables the creation of multiple objects in a database without encountering namespace collisions.
考题
Which three statements are true about the working of system privileges in a multitenant control database(CDB) that has pluggable databases (PDBs)?()A、System privileges apply only to the PDB in which they are used.B、Local users cannot use local system privileges on the schema of a common user.C、The granter of system privileges must possess the set container privilege.D、Common users connected to a PDB can exercise privileges across other PDBs.E、System privileges with the with grant option container all clause must be granted to a common user before the common user can grant privileges to other users.
考题
In your database instance, the user sessions are connected to the database server from the remotemachines. You want to achieve the following for these users: 1:The user account must be locked after four unsuccessful login attempts.PASSWORD_LOCK_TIME 2:The user must be prompted to change the password at regular intervals.PASSWORD_LIFE_TIME 3:The user may not have more than three simultaneous sessions.SESSIONS_PER_USER 4:The user session must automatically be logged off if more than 10 minutes elapsed time used.CONNECT_TIME How would you accomplish the above()A、by assigning profiles for the usersB、by implementing Fine-Grained Auditing (FGA)C、by granting a secure application role to the usersD、by implementing the Database Resource Manager plan
考题
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of two SQL Server 2008 instance. The two instances are respectively named InstanceA and InstanceB. There is a database named Dworks on InstanceA. You move the Dworks database to InstanceB. A user use a SQL Server login named Mary to access the database on InstanceA with the password "Tk@87#34". On InstanceB, you create the same SQL Server login. The user tries to use the SQL Server login Mark to access the Dworks database on InstanceB. But the user gets an error message, according to the indication of the message, the access to the Dworks database has been denied. You must make sure that the user can access the Dworks database on InstanceB successfully. So on InstanceB, which Transact-SQL statements should you execute?() A、USE AdventureWorks;ALTER USER Mary WITH LOGIN = Mary; B、USE AdventureWorks;ALTER LOGIN Mary ENABLE; C、USE AdventureWorks;ALTER LOGIN Mary WITH PASSWORD = "Tk@87#34" UNLOCK; D、USE AdventureWorks;ALTER LOGIN Mary WITH DEFAULT_DATABASE = AdventureWorks;
考题
单选题Which step do you need to perform to enable a user with the SYSDBA privilege to log in as SYSDBA in iSQL*Plus?()A
The user must be granted the database administrator (DBA) privilege.B
The user must be listed in the password file for the authentication.C
No special setup is needed for the user to connect as SYSDBA in iSQL*Plus.D
Set up a user in the Oracle Application Server Containers for J2EE (OC4J) user manager,and grant the webDba role to the user.
考题
单选题When using the Tivoli Dynamic Workload Console, which monitor tasks are available to the user?()A
all those that have been created by all usersB
just those created by the user in the current sessionC
all those created by the user and shared with user’s login groupD
just those where the connection engine specifies the user’s logon
考题
单选题You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()A
The user cannot use the role at all.B
The role would not be granted to the user.C
The user needs to enable the role explicitly.D
The user can start using the role immediately.E
The user would have the admin option for the role.
考题
单选题What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()A
The directory must exist with one subdirectory (general).B
The directory must exist with two subdirectories (daily, weekly).C
The directory must exist with three subdirectories (daily, weekly, monthly).D
The directory must exist with four subdirectories (general, daily, weekly, monthly).
考题
单选题Which statement is true about the database and database-user used during installation of IMS Server?()A
A preexisting database user may be used but a new database has to be created during installation.B
A preexisting database may be used but a new database user has to be created during installation.C
A preexisting database and user may be used or a new database and user are created during installation.D
A preexisting database and user cannot be used; a new database and user are created during installation.
考题
单选题Which of the following is a characteristic of a schema?()A
Foreign key references cannot cross schema boundaries.B
A DB2 user must be created before a schema with the same name can be created.C
If no schema is specified when an object is created, the default schema PUBLIC is used.D
A schema enables the creation of multiple objects in a database without encountering namespace collisions.
考题
单选题Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A
The database user must be created using DB2 Control Center.B
The database user must be created using the DB2 Command Line Processor.C
The database user may be created using DB2 Control Center or DB2 Command Line Processor.D
The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.
考题
多选题Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()Ato add second factor based authentication to a Web applicationBto pre-populate user wallets with all their application credentials in one goCto enhance out-of-the-box audit logging by creating custom audit log eventsDto create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnEto configure automatic password change on expiry for an application so that the new password is a random string of specified strength
热门标签
最新试卷