It prompts you to set the root user account password
It checks whether file permissions are appropriate within datadir
It asks to remove the test database, which is generated at installation time
It can delete any anonymous accounts
It verifies that all users are configuration with the longer password hash
第1题:
A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()
第2题:
A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()
第3题:
You are maintaining an OLTP database in Oracle10g. You find that the database is generating a large number of trace files. You decide to disable the trace files generated by the ARCn background process. Which action will enable you to disable the trace files generated by the ARCn background process?()
第4题:
What are three actions performed by the mysql_secure_installation tool?()
第5题:
You are installing Oracle Database 11g on your server. During the installation Oracle Universal Installer (OUI) prompts you to enter the path of the inventory directory and also prompts you to specify an operating systemgroup name. Which statement is true in this case()
第6题:
Your company is planning to deploy Windows 7 to all client computers. You have the following requirements: Test an application to detect potential compatibility issues caused by User Account Control (UAC). Monitor an application’s operating system use. You need to select the appropriate method to detect application compatibility issues. What should you do?()
第7题:
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named ServiceGreatUser. A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database user can only perform the two tasks below: the database user executes all stored procedures that currently exist in the Sales database and executes all stored procedures that will be created in the Sales database. So what should you do to ensure this? ()
第8题:
It must include a root password
It is roll back file number 50, and you can recover it by issuing rollback 50
It is created by issuing request system configuration rescue save
It is updated automatically when you commit
第9题:
The ORACLE_BASE parameter is not set.
The installation is being performed by the root user.
The operating system group that will be specified should have root user as its member.
The installation is being performed without the Create Starter Database option selected.
The operating system group that will be specified must have permission to write to the inventory directory
第10题:
ServiceGreatUser should be added to the appropriate fixed database roles.
You should assign the appropriate object-level permissions to ServiceGreatUser
You should assign the appropriate server-level permissions to ServiceGreatLogin
You should assign the appropriate database-level permissions to ServiceGreatUser
第11题:
Map a network drive to the AccSecured/intern folder from Richard’s computer.
Map a network drive to the AccSecured shared folder from Richard’s computer.
Allow the intern user account modify permissions on the intern subfolder.
Allow the intern user account traverse folder/execute file permission on the AccSecured folder.
Allow the intern user account list folder content permission on the AccSecured folder. Removeread extended attributes and read permissions.
第12题:
All control files are opened
All redo files are opened
The password file is opened
The parameter file is opened
All online data files are opened
第13题:
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. When you are absent, a user will use a login named Mary to log in and maintain the database snapshots. The user has to delete the database snapshots for DB1, so you have to give the appropriate permissions to the user. So which database permission should you give the user?()
第14题:
You use a recovery catalog for maintaining your database backups.You execute the following command:$rman TARGET / CATALOG rman / cat@catdbRMAN > BACKUP VALIDATE DATABASE ARCHIVELOG ALL;Which two statements are true?()
第15题:
You work as a database administrator for Certkiller .com. Your database is in the MOUNT state and you execute the following command to open it ALTER DATABASE OPEN; What two actions are performed as a result of this command?()
第16题:
You install a non-RAC Oracle Database. During Installation, the Oracle Universal Installer (OUI) prompts you to enter the path of the Inventory directory and also to specify an operating system group name. Which statement is true?()
第17题:
You need to ensure that users who enter three successive invalid passwords within 5 minutes are locked out for 5 minutes. Which three actions should you perform()
第18题:
You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder. What should you do?()
第19题:
You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder. What should you do?()
第20题:
Set folder permissions to 760.
Set folder permissions to 770.
Set folder permissions to modify
Set folder permissions to full control
第21题:
Import the user accounts as inetOrgPerson objects.
Import the user accounts into Active Directory by using the Ldifde command-line tool.
Export all user accounts from the UNIX servers to a text file.
Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.
Assign random passwords to each user object, and securely distribute the password to the users.
Create the same strong password for each user object, and require users to change their passwords at first logon.
第22题:
Map a network drive to the AccSecuredintern folder from Richard’s computer.
Map a network drive to the AccSecured shared folder from Richard’s computer.
Allow the intern user account modify permissions on the intern subfolder.
Allow the intern user account traverse folder/execute file permission on the AccSecured folder.
Allow the intern user account list folder content permission on the AccSecured folder. Remove read extended attributes and read permissions.
第23题:
Set folder permissions to 760.
Set folder permissions to 770.
Set folder permissions to modify.
Set folder permissions to full control.
第24题:
It prompts you to set the root user account password
It checks whether file permissions are appropriate within datadir
It asks to remove the test database, which is generated at installation time
It can delete any anonymous accounts
It verifies that all users are configuration with the longer password hash