网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

What are three actions performed by the mysql_secure_installation tool?()

  • A、It prompts you to set the root user account password
  • B、It checks whether file permissions are appropriate within datadir
  • C、It asks to remove the test database, which is generated at installation time
  • D、It can delete any anonymous accounts
  • E、It verifies that all users are configuration with the longer password hash

参考答案

更多 “What are three actions performed by the mysql_secure_installation tool?()A、It prompts you to set the root user account passwordB、It checks whether file permissions are appropriate within datadirC、It asks to remove the test database, which is generated at installation timeD、It can delete any anonymous accountsE、It verifies that all users are configuration with the longer password hash” 相关考题
考题 What are three actions performed by the mysql_secure_installation tool?() A.It prompts you to set the root user account passwordB.It checks whether file permissions are appropriate within datadirC.It asks to remove the test database, which is generated at installation timeD.It can delete any anonymous accountsE.It verifies that all users are configuration with the longer password hash

考题 You install a non-RAC Oracle Database. During Installation, the Oracle Universal Installer (OUI) prompts you to enter the path of the Inventory directory and also to specify an operating system group name.Which statement is true?()A. The ORACLE_BASE base parameter is not set.B. The installation is being performed by the root user.C. The operating system group that is specified should have the root user as its member.D. The operating system group that is specified must have permission to write to the inventory directory

考题 You use a recovery catalog for maintaining your database backups.You execute the following command:$rman TARGET / CATALOG rman / cat@catdbRMAN >BACKUP VALIDATE DATABASE ARCHIVELOG ALL;Which two statements are true?()A. Corrupted blocks, if any, are repaired.B. Checks are performed for physical corruptions.C. Checks are performed for logical corruptions.D. Checks are performed to confirm whether all database files exist in correct locationsE. Backup sets containing both data files and archive logs are created.

考题 A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A. Set folder permissions to 760.B. Set folder permissions to 770.C. Set folder permissions to modifyD. Set folder permissions to full control

考题 You are Cisco Channel Partner Account Manager. Which service component within the preparephase recommends the appropriate technology strategy to address a business requirement of the customer?()A、 finding out what a customer requires from a proposed solutionB、 analyzes the customer’s business requirements and recommends the appropriate Cisco technologies to meet business requirementsC、 finding out what end-user training a customer requiresD、 finding out a customer’s physical requirements

考题 A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A、 Set folder permissions to 760.B、 Set folder permissions to 770.C、 Set folder permissions to modify.D、 Set folder permissions to full control.

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. When you are absent, a user will use a login named Mary to log in and maintain the database snapshots. The user has to delete the database snapshots for DB1, so you have to give the appropriate permissions to the user.  So which database permission should you give the user?()  A、DELETE B、CONTROL C、DROP DATABASE D、ALTER ANY DATASPACE

考题 You are the network administrator for ExamSheet inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrator group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary.  Eric wants to prevent Julia from changing the permissions on file that Eric creates. To accomplish his goal, Eric creates a folder named C:/Data. He changes the NTFS permission on C:/Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions.  Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:/Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:/Data.  What should you instruct Eric to do?()A、Add Julia’s user account to the local Power Users group.B、Add Julia’s user account to the local Administrators group.C、Allow Julia’s user account Write permissions to C:///Data.D、Allow Julia’s user account Full Control permission to C:///Data.

考题 A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A、Set folder permissions to 760.B、Set folder permissions to 770.C、Set folder permissions to modifyD、Set folder permissions to full control

考题 You use a recovery catalog for maintaining your database backups.You execute the following command:$rman TARGET / CATALOG rman / cat@catdbRMAN BACKUP VALIDATE DATABASE ARCHIVELOG ALL;Which two statements are true?()A、Corrupted blocks, if any, are repaired.B、Checks are performed for physical corruptions.C、Checks are performed for logical corruptions.D、Checks are performed to confirm whether all database files exist in correct locationsE、Backup sets containing both data files and archive logs are created.

考题 You are maintaining an OLTP database in Oracle10g. You find that the database is generating a large number of trace files. You decide to disable the trace files generated by the ARCn background process.  Which action will enable you to disable the trace files generated by the ARCn background process?()  A、 Remove the LOG_ARCHIVE_DEST parameter from the init.ora file.B、 Set the value of the SQL_TRACE parameter to FALSE in the init.ora file.C、 Use the DBMS_MONITOR.SESSION_TRACE_DISABLE procedure.D、 Set the value of the LOG_ARCHIVE_TRACE initialization parameter to zero.

考题 You work as a database administrator for Certkiller .com. Your database is in the MOUNT state and you execute the following command to open it ALTER DATABASE OPEN; What two actions are performed as a result of this command?()A、All control files are openedB、All redo files are openedC、The password file is openedD、The parameter file is openedE、All online data files are opened

考题 You install a non-RAC Oracle Database. During Installation, the Oracle Universal Installer (OUI) prompts you to enter the path of the Inventory directory and also to specify an operating system group name. Which statement is true?()A、The ORACLE_BASE base parameter is not set.B、The installation is being performed by the root user.C、The operating system group that is specified should have the root user as its member.D、The operating system group that is specified must have permission to write to the inventory directory

考题 You are installing Oracle Database 11g on your server. During the installation Oracle Universal Installer (OUI) prompts you to enter the path of the inventory directory and also prompts you to specify an operating systemgroup name.  Which statement is true in this case()A、The ORACLE_BASE parameter is not set.B、The installation is being performed by the root user.C、The operating system group that will be specified should have root user as its member.D、The installation is being performed without the "Create Starter Database" option selected.E、The operating system group that will be specified must have permission to write to the inventory directory

考题 You are the administrator of a Windows 2003 domain The domain contains 20 Windows 2000 Professional computers and two Windows 2003 Server computers. For the domain, you want to set an account policy that locks any user's account after three consecutive failed logon attempts. You also want to ensure that only administrators will be able to unlock the account. Which two actions should you take?() (Each correct answer presents part of the solution. Choose two)A、Set the Account lockout duration value to 0.B、Set the Account lockout duration value to 3.C、Set the Account lockout threshold value to 0.D、Set the Account lockout threshold value to 3.E、Set the Reset account lockout counter after value to 0.F、Set the Reset account lockout counter after value to 3.

考题 You need to ensure that users who enter three successive invalid passwords within 5 minutes are   locked out for 5 minutes.   Which three actions should you perform()A、Set the Minimum password age setting to one day.B、Set the Maximum password age setting to one day.C、Set the Account lockout duration setting to 5 minutes.D、Set the Reset account lockout counter after setting to 5 minutes.E、Set the Account lockout threshold setting to 3 invalid logon attempts.F、Set the Enforce password history setting to 3 passwords remembered.

考题 Your company is planning to deploy Windows 7 to all client computers.   You have the following requirements:   Test an application to detect potential compatibility issues caused by User Account Control (UAC). Monitor an application’s operating system use.   You need to select the appropriate method to detect application compatibility issues.   What should you do?()A、Use the Standard User Analyzer tool.B、Use the Standard User Analyzer Wizard.C、Use the standalone Setup Analysis Tool.D、Use the Setup Analysis Tool in a virtual environment.

考题 You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()A、Map a network drive to the AccSecured/intern folder from Richard’s computer.B、Map a network drive to the AccSecured shared folder from Richard’s computer.C、Allow the intern user account modify permissions on the intern subfolder.D、Allow the intern user account traverse folder/execute file permission on the AccSecured folder.E、Allow the intern user account list folder content permission on the AccSecured folder. Removeread extended attributes and read permissions.

考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named ServiceGreatUser. A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database user can only perform the two tasks below: the database user executes all stored procedures that currently exist in the Sales database and executes all stored procedures that will be created in the Sales database. So what should you do to ensure this? ()A、ServiceGreatUser should be added to the appropriate fixed database roles. B、You should assign the appropriate object-level permissions to ServiceGreatUser C、You should assign the appropriate server-level permissions to ServiceGreatLogin D、You should assign the appropriate database-level permissions to ServiceGreatUser

考题 You create a Microsoft ASP.NET Web application by using the Microsoft .NET Framework version 3.5.  You use Windows Authentication for the application. You set up NTFS file system permissions for the Sales group to access a particular file. You discover that all the users are able to access the file.  You need to ensure that only the Sales group users can access the file. What additional step should you perform?()A、Remove the rights from the ASP.NET user to the file. B、Remove the rights from the application pool identity to the file. C、Add the identity impersonate="true"/ section to the Web.config file. D、Add the authentication mode="[None]" section to the Web.config file.

考题 You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()A、 Map a network drive to the AccSecuredintern folder from Richard’s computer. B、 Map a network drive to the AccSecured shared folder from Richard’s computer. C、 Allow the intern user account modify permissions on the intern subfolder. D、 Allow the intern user account traverse folder/execute file permission on the AccSecured  folder. E、 Allow the intern user account list folder content permission on the AccSecured folder.  Remove read extended attributes and read permissions.

考题 单选题A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A Set folder permissions to 760.B Set folder permissions to 770.C Set folder permissions to modifyD Set folder permissions to full control

考题 单选题You are installing Oracle Database 11g on your server. During the installation Oracle Universal Installer (OUI) prompts you to enter the path of the inventory directory and also prompts you to specify an operating systemgroup name.  Which statement is true in this case()A The ORACLE_BASE parameter is not set.B The installation is being performed by the root user.C The operating system group that will be specified should have root user as its member.D The installation is being performed without the Create Starter Database option selected.E The operating system group that will be specified must have permission to write to the inventory directory

考题 单选题You are Cisco Channel Partner Account Manager. Which service component within the preparephase recommends the appropriate technology strategy to address a business requirement of the customer?()A  finding out what a customer requires from a proposed solutionB  analyzes the customer’s business requirements and recommends the appropriate Cisco technologies to meet business requirementsC  finding out what end-user training a customer requiresD  finding out a customer’s physical requirements

考题 单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named ServiceGreatUser. A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database user can only perform the two tasks below: the database user executes all stored procedures that currently exist in the Sales database and executes all stored procedures that will be created in the Sales database. So what should you do to ensure this? ()A ServiceGreatUser should be added to the appropriate fixed database roles. B You should assign the appropriate object-level permissions to ServiceGreatUser C You should assign the appropriate server-level permissions to ServiceGreatLogin D You should assign the appropriate database-level permissions to ServiceGreatUser

考题 单选题A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A  Set folder permissions to 760.B  Set folder permissions to 770.C  Set folder permissions to modify.D  Set folder permissions to full control.

考题 多选题What are three actions performed by the mysql_secure_installation tool?()AIt prompts you to set the root user account passwordBIt checks whether file permissions are appropriate within datadirCIt asks to remove the test database, which is generated at installation timeDIt can delete any anonymous accountsEIt verifies that all users are configuration with the longer password hash