网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which step do you need to perform to enable a user with the SYSDBA privilege to log in as SYSDBA in iSQL*Plus?()
A

The user must be granted the database administrator (DBA) privilege.

B

The user must be listed in the password file for the authentication.

C

No special setup is needed for the user to connect as SYSDBA in iSQL*Plus.

D

Set up a user in the Oracle Application Server Containers for J2EE (OC4J) user manager,and grant the webDba role to the user.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which step do you need to perform to enable a user with the SYSDBA privilege to log in as SYSDBA in iSQL*Plus?()A The user must be granted the database administrator (DBA) privilege.B The user must be listed in the password file for the authentication.C No special setup is needed for the user to connect as SYSDBA in iSQL*Plus.D Set up a user in the Oracle Application Server Containers for J2EE (OC4J) user manager,and grant the webDba role to the user.” 相关考题
考题 You are a network administrator for Your network consists of a single Active Directory domain named All servers run Windows Server 2003.A help desk user reports that a user object was accidentally deleted and the user can no longer log on to the domain and access resources. You confirm that the user object was included in the most recent backup.You need to enable the user to log on to the domain. You must ensure that the user retains access to resources.What should you do?()A. Install a new domain controller. Install Active Directory from media by using the most recent backup. Manually initiate replication.B. Decrease the garbage collection interval. Perform a nonauthorative restoration of Active Directory by using the most recent backup.C. Perform a nonauthorative restoration of Active Directory by using the most recent backup. Authoritatively restore the user object that was deleted.D. Re-create a user object that has the same user principal name (UPN) as the user object that was deleted. Authoritatively restore this user object.

考题 Which step do you need to perform to enable a user with the SYSDBA privilege to log in as SYSDBA in iSQL*Plus?()A、The user must be granted the database administrator (DBA) privilege.B、The user must be listed in the password file for the authentication.C、No special setup is needed for the user to connect as SYSDBA in iSQL*Plus.D、Set up a user in the Oracle Application Server Containers for J2EE (OC4J) user manager,and grant the webDba role to the user.

考题  You created a custom menu for the Order Entry application. Which step do you perform before attaching the menu module to the form module?()A、Select file--Administration--Convert B、Select file--Administration--Execute C、Select file--Administration--Compile FileD、No further step is necessary. 

考题 You are configuring SQL1 so that the distributed query in the Sales database can access data in the CRM database on SQL2. You create a linked server for SQL2, and you create a linked server login that uses impersonation.Now, you need to ask the network administrator to configure SQL1. Which two tasks should you ask the administrator to perform?()A、Add the user account that is used by the SQL Server service to the local Administrators group.B、Enable the Do not trust this user for delegation Active Domain property for the user account that is used by the SQL Server service.C、Create a Service Principal Name (SPN) for the user account that is used by the SQL Server service.D、Enable the Trusted for delegation Active Domain property for the user account that is used by the SQL Server service.

考题 You have an Exchange Server 2010 organization.You need to ensure that a user named User1 can access his mailbox by using only Outlook Web App.What should you do? ()A、Modify the mailbox features for User1.B、Enable and configure Outlook Anywhere.C、Create an Outlook Web App Mailbox policy.D、Remove the Autodiscover record from the DNS zone.

考题 Server1 contains a folder named D:/Salesdata, which contains important company data. The hardware-monitoring software reports that the disk that contains volume D is in danger of imminent disk failure. You order a replacement disk, but you must wait at least one day for the disk to be delivered. You discover that you do not have a backup of the D:/Salesdata folder because a recent backup was configured incorrectly. You need to back up the D:/Salesdata folder so that you can restore the data if the disk fails. You need to achieve this goal as quickly as possible. What should you do? ()A、Perform a normal backup of the D:/Salesdata folder.B、Perform an incremental backup of the D:/Salesdata folder.C、Perform a differential backup of the D:/Salesdata folder.D、Perform a daily backup of the D:/Salesdata folder.E、Enable Shadow Copies on volume D:/Configure the shadow copy location as C:/.

考题 You are using Oracle Database 10g. Which statement regarding an incomplete recovery is true?()A、 You do not need to restore all the data files.B、 You do not need to open the database with the RESETLOGS operationC、 You do not need to perform a full backup after the RESETLOGS operation.D、 You do not need to recover all the data files to the same system change number (SCN).

考题 You need to connect to your computer by using the Remote Desktop Connection client.  Which two actions should you perform?()A、Enable Remote Desktop in the System Properties dialog box.B、Enable Remote Assistance in the System Properties dialog box.C、Enable the Remote Desktop exception in Microsoft Windows Firewall.D、Enable the Remote Assistance exception in Microsoft Windows Firewall.E、Enable the Remote Administration exception in Windows Firewall.

考题 You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers

考题 You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()A、Enable automatic certificate enrollmentB、Enforce smart card logonsC、Enable Encrypting File System (EFS) for offline filesD、Enable a screen saver password

考题 You deploy mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack. A server that runs Microsoft Exchange Server 2003 Service Pack 2 is configured by using the default installation settings.   Company security policy requires a complex password for unlocking the Windows Mobilebased devices.   You need to ensure that the Windows Mobilebased devices that perform Microsoft ActiveSync synchronization meet the company security policy.   Which two actions should you perform?()A、Enter all mobile device users in the Exceptions list.B、Enable the Require both numbers and letters option.C、Enable the Allow access to devices that do not fully support password settings option.D、Enable the Minimum password length (characters) option. Configure a value of 6 or greater.

考题 You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You grant a user the Delegated Administrator user role. You need to provide the user with the ability to manage VMs through the VMM Self-Service Portal. What should you do?()A、In VMM, grant the user the Self-Service user role.B、In VMM, grant the user the Administrator user role.C、Enable the Integrated Windows Authentication option for the VMM Self-Service Portal.D、Enable the Single sign-on for Terminal Services option for the VMM Self-Service Portal.

考题 You have three computers that run Windows 7. You use Windows PowerShell to perform remote administration tasks on all three computers. You need to remotely administer all three  computers by usingPowerShell.  Which PowerShell cmdlet should you use?()A、Enable-PSRemotingB、Enable-PSSessionConfigurationC、New-PSDriveD、New-PSSession

考题 You need to configure the local security policy setting to request a user name and password when you make changes to the computer system.  What should you do?()A、Enable the Password must meet complexity requirements setting.B、Enable the User Account Control: Detect application installations and prompt for elevation setting.C、Configure the Interactive logon: Prompt user to change password before expiration setting to a value between 1 and 999.D、Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval mode setting to the Prompt for credentials option.

考题 You need to design a method to enable remote encryption on Server5. What should you do?()A、Configure the editor’s user account properties to enable Store password using reversible encryptionB、Configure the editor’s user account properties to enable Use DES encryption for this accountC、Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policyD、Configure the Server5 computer account properties to enable Trust computer for delegation

考题 A user named User1 uses a computer that runs Windows XP Professional. You need to enable User1 to create local user accounts. You must minimize the rights assigned to the User1 account.  Which group should you add User1 to?() A、AdministratorsB、Power UsersC、Users D、Network Configuration Operators

考题 Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) se rver. You enable Microsoft Word as a RemoteApp application on the RD Session Host server. You need to ensure that the RemoteApp application opens when a user double - clicks a Word (.docx) file on a client computer. Which two actions should you perform?()A、Create a Windows Installer (.msi) file.B、Create a Remote Desktop Protocol (.rdp) file.C、In the properties of the RemoteApp application, enable the Allow any command - line arguments setting.D、Enable the Associate client extensions for this program with the RemoteApp program setting for the file.

考题 You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.if (Page.User.Identity.Name != @"CONTOSO/Administrator") { the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()A、In the Web.config file, enable impersonation.B、In IIS, enable anonymous access.C、In IIS, disable anonymous access.D、In the Web.config file, set the authentication mode to Windows.

考题 You are a network administrator for Your network consists of a single Active Directory domain named All servers run Windows Server 2003. A help desk user reports that a user object was accidentally deleted and the user can no longer log on to the domain and access resources. You confirm that the user object was included in the most recent backup. You need to enable the user to log on to the domain. You must ensure that the user retains access to resources. What should you do?()A、Install a new domain controller. Install Active Directory from media by using the most recent backup. Manually initiate replication.B、Decrease the garbage collection interval. Perform a nonauthorative restoration of Active Directory by using the most recent backup.C、Perform a nonauthorative restoration of Active Directory by using the most recent backup. Authoritatively restore the user object that was deleted.D、Re-create a user object that has the same user principal name (UPN) as the user object that was deleted. Authoritatively restore this user object.

考题 You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Windows Mobilebased device user forgets the PIN for the device.   You need to ensure that the user can unlock the device.   What should you do?()A、Change the password for the domain user account of the user.B、Perform a hard reset of the user’s Windows Mobilebased device.C、Perform a soft reset of the user’s Windows Mobilebased device.D、Connect the Windows Mobilebased device to the desktop computer of the user and change the password of the local user account of the user.

考题 多选题You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.if (Page.User.Identity.Name != @"CONTOSO/Administrator") { the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()AIn the Web.config file, enable impersonation.BIn IIS, enable anonymous access.CIn IIS, disable anonymous access.DIn the Web.config file, set the authentication mode to Windows.

考题 单选题A user has a computer that runs Windows 2000 Professional. The user plans to upgrade the computer to Windows XP Professional. You need to instruct the user how to perform the upgrade. You must ensure that the user is only prompted to enter the Window XP product ID during the installation. Which command should you instruct the user to run?()A sysprep.exe -nosidgenB sysprep.exe -resealC winnt32 /duprepareD winnt32. exe /unattend

考题 单选题You perform a clean installation of Windows XP Professional on a computer. The computer is a member of a workgroup. You need to enable offline files on the computer. What should you do first?()A Disable Fast User Switching.B Run the Accessibility Wizard. C Set the Startup type of the Volume Shadow Copy Service (VSS) to Automatic.D Set the Startup type of the Network Location Awareness (NLA) service to Automatic.

考题 多选题You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.If Page.User.Identity.Name "CONTOSO/Administrator" Then Response.Redirect("login.aspx")End IfYou are logged on as Administrator. When you display the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()AIn the Web.config file, enable impersonation.BIn IIS, enable anonymous access.CIn IIS, disable anonymous access.DIn the Web.config file, set the authentication mode to Windows.

考题 多选题In which scenarios would you rebuild an index?()Awhen you need to disable the index usageBwhen you need to change storage optionsCwhen you need to enable index monitoringDwhen you need to move the index to another tablespace

考题 单选题You are using Oracle Database 10g. Which statement regarding an incomplete recovery is true?()A  You do not need to restore all the data files.B  You do not need to open the database with the RESETLOGS operationC  You do not need to perform a full backup after the RESETLOGS operation.D  You do not need to recover all the data files to the same system change number (SCN).

考题 单选题You created a custom menu for the Order Entry application. Which step do you perform before attaching the menu module to the form module?()A Select file--Administration--Convert B Select file--Administration--Execute C Select file--Administration--Compile FileD No further step is necessary.