niusouti.com

多选题What are three actions performed by the mysql_secure_installation tool?()AIt prompts you to set the root user account passwordBIt checks whether file permissions are appropriate within datadirCIt asks to remove the test database, which is generated at

题目
多选题
What are three actions performed by the mysql_secure_installation tool?()
A

It prompts you to set the root user account password

B

It checks whether file permissions are appropriate within datadir

C

It asks to remove the test database, which is generated at installation time

D

It can delete any anonymous accounts

E

It verifies that all users are configuration with the longer password hash


相似考题
更多“多选题What are three actions performed by the mysql_secure_installation tool?()AIt prompts you to set the root user account passwordBIt checks whether file permissions are appropriate within datadirCIt asks to remove the test database, which is generated at ”相关问题
  • 第1题:

    A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()

    • A、 Set folder permissions to 760.
    • B、 Set folder permissions to 770.
    • C、 Set folder permissions to modify.
    • D、 Set folder permissions to full control.

    正确答案:A

  • 第2题:

    A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()

    • A、Set folder permissions to 760.
    • B、Set folder permissions to 770.
    • C、Set folder permissions to modify
    • D、Set folder permissions to full control

    正确答案:B

  • 第3题:

    You are maintaining an OLTP database in Oracle10g. You find that the database is generating a large number of trace files. You decide to disable the trace files generated by the ARCn background process.  Which action will enable you to disable the trace files generated by the ARCn background process?()  

    • A、 Remove the LOG_ARCHIVE_DEST parameter from the init.ora file.
    • B、 Set the value of the SQL_TRACE parameter to FALSE in the init.ora file.
    • C、 Use the DBMS_MONITOR.SESSION_TRACE_DISABLE procedure.
    • D、 Set the value of the LOG_ARCHIVE_TRACE initialization parameter to zero.

    正确答案:D

  • 第4题:

    What are three actions performed by the mysql_secure_installation tool?()

    • A、It prompts you to set the root user account password
    • B、It checks whether file permissions are appropriate within datadir
    • C、It asks to remove the test database, which is generated at installation time
    • D、It can delete any anonymous accounts
    • E、It verifies that all users are configuration with the longer password hash

    正确答案:A,C,D

  • 第5题:

    You are installing Oracle Database 11g on your server. During the installation Oracle Universal Installer (OUI) prompts you to enter the path of the inventory directory and also prompts you to specify an operating systemgroup name.  Which statement is true in this case()

    • A、The ORACLE_BASE parameter is not set.
    • B、The installation is being performed by the root user.
    • C、The operating system group that will be specified should have root user as its member.
    • D、The installation is being performed without the "Create Starter Database" option selected.
    • E、The operating system group that will be specified must have permission to write to the inventory directory

    正确答案:E

  • 第6题:

    Your company is planning to deploy Windows 7 to all client computers.   You have the following requirements:   Test an application to detect potential compatibility issues caused by User Account Control (UAC). Monitor an application’s operating system use.   You need to select the appropriate method to detect application compatibility issues.   What should you do?()

    • A、Use the Standard User Analyzer tool.
    • B、Use the Standard User Analyzer Wizard.
    • C、Use the standalone Setup Analysis Tool.
    • D、Use the Setup Analysis Tool in a virtual environment.

    正确答案:A

  • 第7题:

    You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named ServiceGreatUser. A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database user can only perform the two tasks below: the database user executes all stored procedures that currently exist in the Sales database and executes all stored procedures that will be created in the Sales database. So what should you do to ensure this? ()

    • A、ServiceGreatUser should be added to the appropriate fixed database roles. 
    • B、You should assign the appropriate object-level permissions to ServiceGreatUser 
    • C、You should assign the appropriate server-level permissions to ServiceGreatLogin 
    • D、You should assign the appropriate database-level permissions to ServiceGreatUser

    正确答案:D

  • 第8题:

    多选题
    Which two statements are true about the rescue configuration file?()
    A

    It must include a root password

    B

    It is roll back file number 50, and you can recover it by issuing rollback 50

    C

    It is created by issuing request system configuration rescue save

    D

    It is updated automatically when you commit


    正确答案: C,A
    解析: 暂无解析

  • 第9题:

    单选题
    You are installing Oracle Database 11g on your server. During the installation Oracle Universal Installer (OUI) prompts you to enter the path of the inventory directory and also prompts you to specify an operating systemgroup name.  Which statement is true in this case()
    A

    The ORACLE_BASE parameter is not set.

    B

    The installation is being performed by the root user.

    C

    The operating system group that will be specified should have root user as its member.

    D

    The installation is being performed without the Create Starter Database option selected.

    E

    The operating system group that will be specified must have permission to write to the inventory directory


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named ServiceGreatUser. A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database user can only perform the two tasks below: the database user executes all stored procedures that currently exist in the Sales database and executes all stored procedures that will be created in the Sales database. So what should you do to ensure this? ()
    A

    ServiceGreatUser should be added to the appropriate fixed database roles. 

    B

    You should assign the appropriate object-level permissions to ServiceGreatUser 

    C

    You should assign the appropriate server-level permissions to ServiceGreatLogin 

    D

    You should assign the appropriate database-level permissions to ServiceGreatUser


    正确答案: C
    解析: 暂无解析

  • 第11题:

    多选题
    You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()
    A

    Map a network drive to the AccSecured/intern folder from Richard’s computer.

    B

    Map a network drive to the AccSecured shared folder from Richard’s computer.

    C

    Allow the intern user account modify permissions on the intern subfolder.

    D

    Allow the intern user account traverse folder/execute file permission on the AccSecured folder.

    E

    Allow the intern user account list folder content permission on the AccSecured folder. Removeread extended attributes and read permissions.


    正确答案: C,B
    解析: The traverse folder/execute file permission” enables Richard to traverse the AccSecured folder to reach the intern folder, while the modify permissions on the intern folder allow Richard to modify information in the intern subfolder.

  • 第12题:

    多选题
    You work as a database administrator for Certkiller .com. Your database is in the MOUNT state and you execute the following command to open it ALTER DATABASE OPEN; What two actions are performed as a result of this command?()
    A

    All control files are opened

    B

    All redo files are opened

    C

    The password file is opened

    D

    The parameter file is opened

    E

    All online data files are opened


    正确答案: C,D
    解析: 暂无解析

  • 第13题:

    You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. When you are absent, a user will use a login named Mary to log in and maintain the database snapshots. The user has to delete the database snapshots for DB1, so you have to give the appropriate permissions to the user.  So which database permission should you give the user?()  

    • A、DELETE 
    • B、CONTROL 
    • C、DROP DATABASE 
    • D、ALTER ANY DATASPACE

    正确答案:C

  • 第14题:

    You use a recovery catalog for maintaining your database backups.You execute the following command:$rman TARGET / CATALOG rman / cat@catdbRMAN > BACKUP VALIDATE DATABASE ARCHIVELOG ALL;Which two statements are true?()

    • A、Corrupted blocks, if any, are repaired.
    • B、Checks are performed for physical corruptions.
    • C、Checks are performed for logical corruptions.
    • D、Checks are performed to confirm whether all database files exist in correct locations
    • E、Backup sets containing both data files and archive logs are created.

    正确答案:B,D

  • 第15题:

    You work as a database administrator for Certkiller .com. Your database is in the MOUNT state and you execute the following command to open it ALTER DATABASE OPEN; What two actions are performed as a result of this command?()

    • A、All control files are opened
    • B、All redo files are opened
    • C、The password file is opened
    • D、The parameter file is opened
    • E、All online data files are opened

    正确答案:B,E

  • 第16题:

    You install a non-RAC Oracle Database. During Installation, the Oracle Universal Installer (OUI) prompts you to enter the path of the Inventory directory and also to specify an operating system group name. Which statement is true?()

    • A、The ORACLE_BASE base parameter is not set.
    • B、The installation is being performed by the root user.
    • C、The operating system group that is specified should have the root user as its member.
    • D、The operating system group that is specified must have permission to write to the inventory directory

    正确答案:D

  • 第17题:

    You need to ensure that users who enter three successive invalid passwords within 5 minutes are   locked out for 5 minutes.   Which three actions should you perform()

    • A、Set the Minimum password age setting to one day.
    • B、Set the Maximum password age setting to one day.
    • C、Set the Account lockout duration setting to 5 minutes.
    • D、Set the Reset account lockout counter after setting to 5 minutes.
    • E、Set the Account lockout threshold setting to 3 invalid logon attempts.
    • F、Set the Enforce password history setting to 3 passwords remembered.

    正确答案:C,D,E

  • 第18题:

    You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()

    • A、Map a network drive to the AccSecured/intern folder from Richard’s computer.
    • B、Map a network drive to the AccSecured shared folder from Richard’s computer.
    • C、Allow the intern user account modify permissions on the intern subfolder.
    • D、Allow the intern user account traverse folder/execute file permission on the AccSecured folder.
    • E、Allow the intern user account list folder content permission on the AccSecured folder. Removeread extended attributes and read permissions.

    正确答案:C,D

  • 第19题:

    You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()

    • A、 Map a network drive to the AccSecuredintern folder from Richard’s computer. 
    • B、 Map a network drive to the AccSecured shared folder from Richard’s computer. 
    • C、 Allow the intern user account modify permissions on the intern subfolder. 
    • D、 Allow the intern user account traverse folder/execute file permission on the AccSecured  folder. 
    • E、 Allow the intern user account list folder content permission on the AccSecured folder.  Remove read extended attributes and read permissions.

    正确答案:C,D

  • 第20题:

    单选题
    A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()
    A

    Set folder permissions to 760.

    B

    Set folder permissions to 770.

    C

    Set folder permissions to modify

    D

    Set folder permissions to full control


    正确答案: C
    解析: 暂无解析

  • 第21题:

    多选题
    You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()
    A

    Import the user accounts as inetOrgPerson objects.

    B

    Import the user accounts into Active Directory by using the Ldifde command-line tool.

    C

    Export all user accounts from the UNIX servers to a text file.

    D

    Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.

    E

    Assign random passwords to each user object, and securely distribute the password to the users.

    F

    Create the same strong password for each user object, and require users to change their passwords at first logon.


    正确答案: C,B
    解析: 暂无解析

  • 第22题:

    多选题
    You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()
    A

    Map a network drive to the AccSecuredintern folder from Richard’s computer.

    B

    Map a network drive to the AccSecured shared folder from Richard’s computer.

    C

    Allow the intern user account modify permissions on the intern subfolder.

    D

    Allow the intern user account traverse folder/execute file permission on the AccSecured  folder.

    E

    Allow the intern user account list folder content permission on the AccSecured folder.  Remove read extended attributes and read permissions.


    正确答案: B,E
    解析: The traverse folder/execute file permission” enables Richard to traverse the AccSecured folder to reach the intern folder. While the modify permissions on the intern folder allow Richard to modify information in the intern subfolder.

  • 第23题:

    单选题
    A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()
    A

     Set folder permissions to 760.

    B

     Set folder permissions to 770.

    C

     Set folder permissions to modify.

    D

     Set folder permissions to full control.


    正确答案: D
    解析: 暂无解析

  • 第24题:

    多选题
    What are three actions performed by the mysql_secure_installation tool?()
    A

    It prompts you to set the root user account password

    B

    It checks whether file permissions are appropriate within datadir

    C

    It asks to remove the test database, which is generated at installation time

    D

    It can delete any anonymous accounts

    E

    It verifies that all users are configuration with the longer password hash


    正确答案: C,D
    解析: 暂无解析