考题
Protecting the confidentiality, integrity and availability of these information resources is a priority and a job responsibility for all employees at all levels of the company.
考题
ABC Corp. is implementing 11i Oracle Applications. The company has two local administrators in separate locations. They need to ensure that only a relevant set of users is visible to each of these local administrators.Which action will meet the requirement?()A.create a separate role for each local administratorB.specify user administration privileges in Oracle User ManagementC.use Data Security to provide relevant access to each local administratorD.use Function Security to provide relevant access to each local administrator
考题
共用题干
Health Care in the USHealth care in the US is well-known but very expensive.Paying the doctor's bill after a major illness or accident can cost hundreds of thousands of dollars.In the US,a person's company,not the government,pays for health insurance. Employers have contracts with insurance companies,which pay for all or part of employees' doctors' bills.The amount that the insurance company will pay out to a patient differs wildly. It all depends on what insurance the employer pays.The less the boss pays to the insurance company,the more the employee has to pay the hospital each time he or she gets sick. In 2004,the average worker paid an extra US$558 a year,according to a San Francisco report.The system also means many Americans fall through the cracks(遭遗漏).In 2004, only 61 percent of the population received health insurance through their employers, according to the report. The unemployed,self-employed,part-time workers and graduated students with no jobs were not included,Most US university students have a gap between their last day of school and their first day on the job.Often,they are no longer protected by their parents' insurance because they are now considered independent adults.They also cannot buy university health insurance because they are no longer students.Another group that falls through the gap of the US system is international students.All are required to have health insurance and cannot begin their classes without it,But exact policies(保险单)differ from school to school.Most universities work with health insurance companies and sell their own standard plan for students.Often,buying the school plan is required,but luckily it's also cheaper than buying direct from the insurance company. In the US,a person's company buys him or her health insurance.A:Right B:Wrong C:Not mentioned
考题
共用题干
Health Care in the USHealth care in the US is well-known but very expensive.Paying the doctor's bill after a major illness or accident can cost hundreds of thousands of dollars.In the US,a person's company,not the government,pays for health insurance. Employers have contracts with insurance companies,which pay for all or part of employees' doctors' bills.The amount that the insurance company will pay out to a patient differs wildly. It all depends on what insurance the employer pays.The less the boss pays to the insurance company,the more the employee has to pay the hospital each time he or she gets sick. In 2004,the average worker paid an extra US$558 a year,according to a San Francisco report.The system also means many Americans fall through the cracks(遭遗漏).In 2004, only 61 percent of the population received health insurance through their employers, according to the report. The unemployed,self-employed,part-time workers and graduated students with no jobs were not included,Most US university students have a gap between their last day of school and their first day on the job.Often,they are no longer protected by their parents' insurance because they are now considered independent adults.They also cannot buy university health insurance because they are no longer students.Another group that falls through the gap of the US system is international students.All are required to have health insurance and cannot begin their classes without it,But exact policies(保险单)differ from school to school.Most universities work with health insurance companies and sell their own standard plan for students.Often,buying the school plan is required,but luckily it's also cheaper than buying direct from the insurance company. The health care system in the US takes care of everyone in the country.A:Right B:Wrong C:Not mentioned
考题
资料:Gone are the days of “one-size-fits-all” employee benefits programs and here come newly designed and fully customized voluntary benefits. Voluntary benefits are on longer looked at as just a few “extras”, and are now becoming part of a comprehensive benefits package. Lot's take a look at how voluntary benefits have become more customized to meet the requirements of a more particular health care consumer.
Voluntary Benefits Bolster Recruitment and Retention Efforts
It gives employees a chance to select extras that the standard health care plan doesn't offer, which can be highly attractive to today's consumers Employers can also use voluntary benefits to round out their health care plans with a menu of items that cover everything from family vision care to pet insurance. This helps companies to address the specific heath and financial needs of candidates, to help the stretch their future paychecks even further.
The Advantages of Offering Voluntary Employee Benefits
In terms of being adaptable to the needs of employees, there are very few benefits that are like voluntary plans. Voluntary plans cover many of the gaps that traditional health benefits do not cover. For example, a health care plan may require dental services for minors, but not for adults. The voluntary dental program can cover things like routine cleanings and other preventative measures that help support good oral health.
Customizing Voluntary Benefit Plans
There are several areas where voluntary benefit plans exceed the customization options of other types of wellness and financial benefits. This is a continual trend that we will see more of. Financial wellness benefits can include budgeting software, company matched savings plans, employee purchase programs, discount cards, credit union access, and even short term financing to help employees who otherwise cannot get credit to purchase things they need. Some companies offer support for buying of leasing vehicles, pay off college loans, arrange for special discounts and deals on home rentals and purchases, and even provide access to tuition for college expenses.
According to the passage, which is probably NOT included in the financial wellness benefits?
A.Long term financing to help employees.
B.Employee purchase programs and discount cards.
C.Pay off college loans.
D.Budgeting software and company matched savings plans.
考题
资料:Gone are the days of “one-size-fits-all” employee benefits programs and here come newly designed and fully customized voluntary benefits. Voluntary benefits are on longer looked at as just a few “extras”, and are now becoming part of a comprehensive benefits package. Lot's take a look at how voluntary benefits have become more customized to meet the requirements of a more particular health care consumer.
Voluntary Benefits Bolster Recruitment and Retention Efforts
It gives employees a chance to select extras that the standard health care plan doesn't offer, which can be highly attractive to today's consumers Employers can also use voluntary benefits to round out their health care plans with a menu of items that cover everything from family vision care to pet insurance. This helps companies to address the specific heath and financial needs of candidates, to help the stretch their future paychecks even further.
The Advantages of Offering Voluntary Employee Benefits
In terms of being adaptable to the needs of employees, there are very few benefits that are like voluntary plans. Voluntary plans cover many of the gaps that traditional health benefits do not cover. For example, a health care plan may require dental services for minors, but not for adults. The voluntary dental program can cover things like routine cleanings and other preventative measures that help support good oral health.
Customizing Voluntary Benefit Plans
There are several areas where voluntary benefit plans exceed the customization options of other types of wellness and financial benefits. This is a continual trend that we will see more of. Financial wellness benefits can include budgeting software, company matched savings plans, employee purchase programs, discount cards, credit union access, and even short term financing to help employees who otherwise cannot get credit to purchase things they need. Some companies offer support for buying of leasing vehicles, pay off college loans, arrange for special discounts and deals on home rentals and purchases, and even provide access to tuition for college expenses.
It can be inferred from the passage that, comparing with the traditional health benefits, voluntary plans______A.incur less cost by the company to offer benefit programs.
B.cover many of the gaps that traditional health benefits do not cover.
C.help employees who are dealing with tough personal and career matters.
D.encourage employees to stay with their companies for longer periods of time.
考题
资料:Gone are the days of “one-size-fits-all” employee benefits programs and here come newly designed and fully customized voluntary benefits. Voluntary benefits are on longer looked at as just a few “extras”, and are now becoming part of a comprehensive benefits package. Lot's take a look at how voluntary benefits have become more customized to meet the requirements of a more particular health care consumer.
Voluntary Benefits Bolster Recruitment and Retention Efforts
It gives employees a chance to select extras that the standard health care plan doesn't offer, which can be highly attractive to today's consumers Employers can also use voluntary benefits to round out their health care plans with a menu of items that cover everything from family vision care to pet insurance. This helps companies to address the specific heath and financial needs of candidates, to help the stretch their future paychecks even further.
The Advantages of Offering Voluntary Employee Benefits
In terms of being adaptable to the needs of employees, there are very few benefits that are like voluntary plans. Voluntary plans cover many of the gaps that traditional health benefits do not cover. For example, a health care plan may require dental services for minors, but not for adults. The voluntary dental program can cover things like routine cleanings and other preventative measures that help support good oral health.
Customizing Voluntary Benefit Plans
There are several areas where voluntary benefit plans exceed the customization options of other types of wellness and financial benefits. This is a continual trend that we will see more of. Financial wellness benefits can include budgeting software, company matched savings plans, employee purchase programs, discount cards, credit union access, and even short term financing to help employees who otherwise cannot get credit to purchase things they need. Some companies offer support for buying of leasing vehicles, pay off college loans, arrange for special discounts and deals on home rentals and purchases, and even provide access to tuition for college expenses.
Which of the following titles would best describe the content of the passage?A.Voluntary Employee Benefits surpasses the traditional health benefit.
B.Voluntary Employee Benefits are becoming more customized.
C.The Advantages of Offering Voluntary Employee Benefits.
D.Voluntary Employee Benefits and health care consumers.
考题
RBTelco is a large multinational company that outsources health care benefit management to RBBenefits. RBTelco employees access RBBenefits resources through an authenticate-able account at each company. RBBenefit and RBTelco will use SAML V1.0. Which IBM Tivoli Access Manager for e-business (ITAMeb) and IBM Tivoli Federated Identity Manager (ITFIM) components are required to be installed at RBTelco?()A、TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console B、TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit C、TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit D、TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, ITFIM Demonstration Scenarios, WebSEAL Application Developer Kit
考题
You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()A、show services unified-access-control authentication-tableB、show auth tableC、show services unified-access-control policiesD、show services unified-access-control captive-portal
考题
ABC Corp. is implementing 11i Oracle Applications. The company has two local administrators in separate locations. They need to ensure that only a relevant set of users is visible to each of these local administrators. Which action will meet the requirement?()A、create a separate role for each local administratorB、specify user administration privileges in Oracle User ManagementC、use Data Security to provide relevant access to each local administratorD、use Function Security to provide relevant access to each local administrator
考题
You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy. What should you do?()A、Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.B、Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.C、Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.D、Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.E、Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.
考题
You are a database administrator for your company. The company’s financial forecasting application uses a SQL Server 2005 database that enables business users to run both ad hoc and predefined queries. You suspect that some queries consume an excessive amount of server resources. You need to identify which queries consume the most resources. You want to achieve this goal as quickly as possible. What should you do?()A、Use the DBCC INPUTBUFFER command.B、Use the sys.dm_exec_query_stats dynamic management view (DMV).C、Use the sqldiag utility.D、Use the SHOWPLAN session option.
考题
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a computer which hosts several applications in your company. The instance runs on the computer. A job named DiliveryList is created by you. This job requires a file to be written to a file server. But because the job cannot access the file server, it fails to run. You intend to configure the SQL Server Agent service so that only the SQL Server Agent service has read and write access to the file server. Which account type should you use? () A、You should use local Service accountB、You should use network Service accountC、You should use domain accountD、You should use local System account
考题
Your company hires 10 new employees. You want the new employees to connect to the main office through a VPN connection. You create new user accounts and grant the new employees the Allow Read and Allow Execute permissions to shared resources in the main office. The new employees are unable to access shared resources in the main office. You need to ensure that users are able to establish a VPN connection to the main office. What should you do()A、Grant the new employees the Allow Full control permission.B、Grant the new employees the Allow Access Dial-in permission.C、Add the new employees to the Remote Desktop Users security group.D、Add the new employees to the Windows Authorization Access security group.
考题
You are a security administrator for your company. The network consists of three Active Directory domains. All Active Directory domains are running at a Windows Server 2003 mode functionality level. Employees in the editorial department of your company need access to resources on file servers that are in each of the Active Directory domains. Each Active Directory domain in the company contains at least one editorial department employee user account. You need to create a single group named Company Editors that contains all editorial department employee user accounts and that has access to the resources on file server computers. What should you do?()A、 Create a global distribution group in the forest root domain and name it Company Editors.B、 Create a global security group in the forest root domain and name it Company Editors.C、 Create a universal distribution group in the forest root domain and name it Company Editors. D、 Create a universal security group in the forest root domain and name it Company Editors.
考题
The human resources department has informed you that two new temporary part-time employees will join your company next week. You are required to set up a workstation that will be used bythese employees. They do not need access to the network but they will need to access an HP LaserJet printer attached to the local computer. You install Windows 2000 Professional and format the hard disk using NTFS. What type of user account should you create for them?()A、No account. They can use the built-in guest account.B、No Account. They can use the built-in Administrator account.C、Local user accountD、Domain user account
考题
单选题Your company hires 10 new employees. You want the new employees to connect to the main office through a VPN connection. You create new user accounts and grant the new employees the Allow Read and Allow Execute permissions to shared resources in the main office. The new employees are unable to access shared resources in the main office. You need to ensure that users are able to establish a VPN connection to the main office. What should you do()A
Grant the new employees the Allow Full control permission.B
Grant the new employees the Allow Access Dial-in permission.C
Add the new employees to the Remote Desktop Users security group.D
Add the new employees to the Windows Authorization Access security group.
考题
单选题You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy. What should you do?()A
Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.B
Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.C
Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.D
Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.E
Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.
考题
单选题RBTelco is a large multinational company that outsources health care benefit management to RBBenefits. RBTelco employees access RBBenefits resources through an authenticate-able account at each company. RBBenefit and RBTelco will use SAML V1.0. Which IBM Tivoli Access Manager for e-business (ITAMeb) and IBM Tivoli Federated Identity Manager (ITFIM) components are required to be installed at RBTelco?()A
TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console B
TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit C
TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, WebSEAL Application Developer Kit D
TAMeb Runtime, TAMeb Policy Server, TAMeb Authorization Server, TAMeb Java Runtime Environment, TAMeb WebSEAL Server, ITFIM Runtime and Management Services, ITFIM Management Console, ITFIM Demonstration Scenarios, WebSEAL Application Developer Kit
考题
填空题I (work) ____ in the Human Resources Department for five months since I joined the company.
考题
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a computer which hosts several applications in your company. The instance runs on the computer. A job named DiliveryList is created by you. This job requires a file to be written to a file server. But because the job cannot access the file server, it fails to run. You intend to configure the SQL Server Agent service so that only the SQL Server Agent service has read and write access to the file server. Which account type should you use? ()A
You should use local Service accountB
You should use network Service accountC
You should use domain accountD
You should use local System account
考题
单选题China is developing a rural health care service system; I am sure more peasants will benefit _____.A
of whichB
from whichC
in whichD
about which
考题
单选题The human resources department has informed you that two new temporary part-time employees will join your company next week. You are required to set up a workstation that will be used bythese employees. They do not need access to the network but they will need to access an HP LaserJet printer attached to the local computer. You install Windows 2000 Professional and format the hard disk using NTFS. What type of user account should you create for them?()A
No account. They can use the built-in guest account.B
No Account. They can use the built-in Administrator account.C
Local user accountD
Domain user account
考题
单选题You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()A
show services unified-access-control authentication-tableB
show auth tableC
show services unified-access-control policiesD
show services unified-access-control captive-portal
考题
单选题Cisco SMARTnet maintains the operational health of your network through Cisco expertise and resources that promote greater uptime and extend the value of your IT investment. Which serviceis provided by Cisco SMARTnet?()A
upgrade discountsB
Free CCO accountC
Cisco Learning CreditsD
around-the-clock access toCisco Technical Access Center
考题
单选题You are a security administrator for your company. The network consists of three Active Directory domains. All Active Directory domains are running at a Windows Server 2003 mode functionality level. Employees in the editorial department of your company need access to resources on file servers that are in each of the Active Directory domains. Each Active Directory domain in the company contains at least one editorial department employee user account. You need to create a single group named Company Editors that contains all editorial department employee user accounts and that has access to the resources on file server computers. What should you do?()A
Create a global distribution group in the forest root domain and name it Company Editors.B
Create a global security group in the forest root domain and name it Company Editors.C
Create a universal distribution group in the forest root domain and name it Company Editors. D
Create a universal security group in the forest root domain and name it Company Editors.
考题
单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as the administrator of a SQL Server 2005 computer, and the computer is named SQL1. Microsoft Windows Server 2003 is run by all servers. All the servers belong to a Microsoft Active Directory domain. According to the company written security policy, strong passwords are mandated for all domain, local, and application accounts. The company utilizes a Group Policy object (GPO) to deploy the proper domain password policy. MS-DOS-based or UNIX-based operating systems are run by many of the company’s computers. Varying levels of access to a database named Services on SQL1 is requested by the computers. Since you are the database administrator, you are required to confirm that the Services database can be accessed by these computers. And the company’s written security policy should not be violated. Which action should be performed by you?()A
A domain account should be created for each of the company’s users. And then, each domain account should be offered with access to SQL1 and the Services database.B
A local logon account should be created on SQL1 for each of the company’s users. And then, each logon account should be offered with access to SQL1 and the Services database.C
One SQL Server logon account should be created for all of the company’s computers running MS-DOS or UNIX-based operating systems. And then, the Enforce password policy option should be enabled for users’ accounts. At last, the logon accounts should be provided with access to the Services database.D
A SQL Server logon account should be created for each of the company’s users. And then, the Enforce password policy option should be enabled for each logon account. At last, each logon account should be offered with access to the Services database.E
A virtual directory should be configured through Internet Information Services (IIS) for access to SQL1. And then, users should be directed to the virtual directory for data access.