网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You opened the encryption wallet and then issued the following command:   SQL>CREATE TABLESPACE securespace DATAFILE ’/home/user/oradata/secure01.dbf’ SIZE 150M  ENCRYPTION USING ’3DES168’ DEFAULT STORAGE(ENCRYPT);   Then you closed the wallet. Later, you issued the following command to create theEMPLOYEES table in the SECURESPACE tablespace and you use the NO SALT option for the EMPID column.  What is the outcome?()
A

 It creates the table and encrypts the data in it.

B

 It generates an error because the wallet is closed.

C

 It creates the table but does not encrypt the data in it.

D

 It generates an error because the NO SALT option cannot be used with the ENCRYPT option.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You opened the encryption wallet and then issued the following command:   SQLCREATE TABLESPACE securespace DATAFILE ’/home/user/oradata/secure01.dbf’ SIZE 150M  ENCRYPTION USING ’3DES168’ DEFAULT STORAGE(ENCRYPT);   Then you closed the wallet. Later, you issued the following command to create theEMPLOYEES table in the SECURESPACE tablespace and you use the NO SALT option for the EMPID column.  What is the outcome?()A  It creates the table and encrypts the data in it.B  It generates an error because the wallet is closed.C  It creates the table but does not encrypt the data in it.D  It generates an error because the NO SALT option cannot be used with the ENCRYPT option.” 相关考题
考题 I () his face when he opened the letter. A.should like you to seeB.would have liked you to be seenC.should like you to have seenD.would like you to see

考题 What are you doing? I'm _____the bedroom for my wallet. A.lookingB.findingC.searchingD.searching for

考题 --- I can’t find my wallet.--- _____ it at home? A.Must you leaveB.Maybe you leaveD.You might leftD.Might you have left

考题 We request you to see to it that L/C is opened by cable ()order is placed with us.A、whateverB、wheneverC、whereverD、whoever

考题 –What‘s up? – () A.The box is up.B.I lost my wallet.C.It‘s up to you.D.It‘s all right.

考题 Examine the following RMAN command:RMAN CONFIGURE ENCRYPTION FOR DATABASE ON;RMAN BACKUP DATABASE PLUS ARCHIVELOG;Which prerequisite must be met before accomplishing the backup?() A. Provide a password for the encryptionB. Set up an Oracle wallet for the encryptionC. No setup is required as it is a default encryption methodD. Both Oracle wallet and password must be set up for the encryption

考题 You opened the encryption wallet and then issued the following command:Then you closed the wallet. Later, you issued the following command to create the EMPLOYEES table in the SECURESPACE tablespace and you use the NO SALT option for the EMPID column.What is the outcome?()A. It creates the table and encrypts the data in it.B. It generates an error because the wallet is closed.C. It creates the table but does not encrypt the data in it.D. It generates an error because the NO SALT option cannot be used with the ENCRYPT option.

考题 You created an encrypted tablespace:You then closed the encryption wallet because you were advised that this is secure.Later in the day, you attempt to create the EMPLOYEES table in the SECURESPACE tablespace with the SALT option on the EMPLOYEE column.Which is true about the result?()A. It creates the table successfully but does not encrypt any inserted data in the EMPNAME column because the wallet must be opened to encrypt columns with SALT.B. It generates an error when creating the table because the wallet is closed.C. It creates the table successfully, and encrypts any inserted data in the EMPNAME column because the wallet needs to be open only for tablespace creation.D. It generates error when creating the table, because the salt option cannot be used with encrypted tablespaces.

考题 You just issued the following statement: ALTER TABLE SALES DROP COLUMN PROFIT. Which of the following choices identifies when the column will actually be removed from Oracle?()A、Immediately following statement execution B、After the ALTER TABLE DROP UNUSED COLUMNS command is issued C、After the ALTER TABLE SET UNUSED COLUMN command is issued D、After the ALTER TABLE MODIFY command is issued

考题 Examine the following RMAN command:   RMAN CONFIGURE ENCRYPTION FOR DATABASE ON; RMAN BACKUP DATABASE PLUS ARCHIVELOG;   Which prerequisite must be met before accomplishing the backup?()A、 Provide a password for the encryptionB、 Set up an Oracle wallet for the encryptionC、 No setup is required as it is a default encryption methodD、 Both Oracle wallet and password must be set up for the encryption

考题 Which two statements are true about encrypting RMAN backup?()A、 The transparent encryption of backups uses the encryption walletB、 The database uses the same encryption key for every encrypted backupC、 The password encryption of backups only uses the password while creating and restoring backupD、 If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups

考题 our database is in the MOUNT state and you execute the following command to open it:  ALTER DATABASE OPEN  What two actions are performed as a result of this command?()A、All control files are opened.B、All redo log files are openedC、The password file is opened.D、The parameter file is opened.E、All online data files are opened.

考题 You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. A database is utilized by the instance, and the database is utilized by a Web-based application. 15,000 transactions are processed by the application every minute. A column is contained by a table in the database, and the column is utilized only by the application. Sensitive data is stored in this column. The sensitive data should be stored with the highest security level. In addition, the least amount of memory space and processor time should be utilized. From the following four encryption types, which one should you utilize?()A、Asymmetric key encryption should be utilized.B、Certificate-based encryption should be utilized.C、Symmetric key encryption should be utilized.D、Transparent data encryption should be utilized.

考题 You need to design a method to enable remote encryption on Server5. What should you do?()A、Configure the editor’s user account properties to enable Store password using reversible encryptionB、Configure the editor’s user account properties to enable Use DES encryption for this accountC、Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policyD、Configure the Server5 computer account properties to enable Trust computer for delegation

考题 You have an Exchange Server 2010 organization.Users on the network use HTTPS to connect to Outlook Web App (OWA).The Client Access server uses a certificate issued by an internal certification authority (CA).You plan to deploy an e-mail encryption solution for all users. You need to ensure that users can send and receive encrypted e-mail messages by using S/MIME from OWA.What should you do?()A、Issue a certificate to each userB、Instruct all OWA users to import a root CA certificateC、Modify the authentication settings of the OWA virtual directoryD、Configure the Client Access Server to use a certificate issued by a third-party CA

考题 You want to configure your Windows 2000 Professional computer to remotely access your company's Windows 2000 Routing and Remote Access server. You configure a VPN connection. For security purposes, you configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically, to enable IPSec, and to set IPSec to Secure Server.  When you try to connect, you receive the following error message, "The encryption attempt failed because no valid certificate was found."  What should you do to connect to the server? ()A、Enable the VPN connection to use MS-CHAP.B、Change the data encryption setting toOptional Encryption.C、Specify a TCP/IP address in theNetworkproperties.D、Change the IPSec policy setting toClient.

考题 单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now in a high security environment, you manage a SQL Server 2008 cluster. You intend to configure and use encrypted connections for the clustered virtual SQL Server. You have to install a certificate. The cetification will be used for encryption. What should you do?()A In the cluster quorum drive, install the encryption certificate B In the SQL Server shared disk, install the encryption certificate C in the cluster group, install the encryption certificate. D On each individual node, install the encryption certificate

考题 多选题our database is in the MOUNT state and you execute the following command to open it:  ALTER DATABASE OPEN  What two actions are performed as a result of this command?()AAll control files are opened.BAll redo log files are openedCThe password file is opened.DThe parameter file is opened.EAll online data files are opened.

考题 单选题As soon as you hear the fire and emergency signal, you should ensure that the ().A ring buoys are thrown overboardB engines are stoppedC fire pumps are startedD life preservers have been issued to everyone

考题 单选题Examine the following RMAN command: RMAN CONFIGURE ENCRYPTION FOR DATABASE ON; RMAN BACKUP DATABASE PLUS ARCHIVELOG; Which prerequisite must be met before accomplishing the backup?()A Provide a password for the encryptionB Set up an Oracle wallet for the encryptionC No setup is required as it is a default encryption methodD Both Oracle wallet and password must be set up for the encryption

考题 多选题Which two statements are true about encrypting RMAN backup?()AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

考题 单选题You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()A Configure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain usersB Specify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail serversC For each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trustedD Require IPSec encryption on all TCP connections that are used to send or receive e-mail messages

考题 多选题Which two statements are true about encrypting RMAN backup?()AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups

考题 单选题You need to include a disclaimer to all sent messages in your organization. Some of the users require message encryption.How do you make sure that disclaimer can be included in encrypted messages?()A Instruct the users to use IRM encryption method onlyB Instruct the users to use S/MIME encryption method onlyC Using command New-ExchangeCertificate cmdletD Using the Set-ExchangeServer cmdlet

考题 单选题You opened the encryption wallet and then issued the following command:   SQLCREATE TABLESPACE securespace DATAFILE ’/home/user/oradata/secure01.dbf’ SIZE 150M  ENCRYPTION USING ’3DES168’ DEFAULT STORAGE(ENCRYPT);   Then you closed the wallet. Later, you issued the following command to create theEMPLOYEES table in the SECURESPACE tablespace and you use the NO SALT option for the EMPID column.  What is the outcome?()A  It creates the table and encrypts the data in it.B  It generates an error because the wallet is closed.C  It creates the table but does not encrypt the data in it.D  It generates an error because the NO SALT option cannot be used with the ENCRYPT option.

考题 多选题Which two statements are true about encrypting RMAN backup?() (Choose two.)AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

考题 单选题To keep your wallet safe, you’d better ______.A hold it in your handB leave it in the hotel safeC put it in your front pocketD keep it in your shoulder bag

考题 单选题You created an encrypted tablespace: You then closed the encryption wallet because you were advised that this is secure. Later in the day, you attempt to create the EMPLOYEES table in the SECURESPACE tablespace with the SALT option on the EMPLOYEE column. Which is true about the result?()A It creates the table successfully but does not encrypt any inserted data in the EMPNAME column because the wallet must be opened to encrypt columns with SALT.B It generates an error when creating the table because the wallet is closed.C It creates the table successfully, and encrypts any inserted data in the EMPNAME column because the wallet needs to be open only for tablespace creation.D It generates error when creating the table, because the salt option cannot be used with encrypted tablespaces.