niusouti.com

单选题A customer has a WebTrade application that initially uses the embedded LDAP to authenticate users. To enhance security, the customer decides to use OAM to authenticate some of the users against an external LDAP store. For this to work, a customer confi

题目
单选题
A customer has a WebTrade application that initially uses the embedded LDAP to authenticate users. To enhance security, the customer decides to use OAM to authenticate some of the users against an external LDAP store. For this to work, a customer configured an OAMAuthenticator, but was not sure what to select for the Control Flag. What Control Flag should the customer choose?()
A

OPTIONAL

B

REQUISITE

C

REQUIRED

D

SUFFICIENT

E

MANDATORY


相似考题
更多“单选题A customer has a WebTrade application that initially uses the embedded LDAP to authenticate users. To enhance security, the customer decides to use OAM to authenticate some of the users against an external LDAP store. For this to work, a customer confi”相关问题
  • 第1题:

    A customer wants to know what version of DirectX the current workstation has installed. Which of the following command line tools would the customer use?()

    • A、edit
    • B、systeminfo
    • C、gpedit.msc
    • D、dxdiag

    正确答案:D

  • 第2题:

    A Customer has a functional server deployment solution that uses a combination of disk imaging and application pushing technology. They need to get a working Windows 2003 image for their new servers as soon as possible. What method can achieve this?()

    • A、Install Windows 2003 using the F6 supply Mass Storage Controller option
    • B、Replace Customer’s deployment solution with Tivoli Provisioning Manager for OS Deployment Director Edition
    • C、Deploy Customer’s existing image and use UXSPi to update IBM specific drivers
    • D、Use ServerGuide to install Windows 2003

    正确答案:D

  • 第3题:

    A customer has an 8-way p650 running an application for about 200 users.  In the past, the requiredamount of memory and processors has increased proportionally to the number of new users.  The customer plans to increase users by 10% each year for the next three years.  Next year, a database will be added to the workload to support the users directly rather than being on a separate machine. What is the most likely result of this projected growth?()

    • A、Disk usage will increase in proportion to memory.
    • B、The new database will demand much more memory.
    • C、Memory demand will increase 10% for the next year.
    • D、Processor demand will increase about 10% for the next year.

    正确答案:B

  • 第4题:

    A frustrated and angry customer calls in with a system that does not work. Which of the following is the FIRST course of action for a technician to take?()

    • A、Transfer the customer to another technician, who can allocate more time to the issue.
    • B、Maintain a positive attitude and offer them the cheapest solution possible to satisfy them.
    • C、Listen to what the customer has to say and calmly recommend the best course of action.
    • D、Use technical language to demonstrate knowledge and expertise to the customer.

    正确答案:C

  • 第5题:

    A customer has a WebTrade application that initially uses the embedded LDAP to authenticate users. To enhance security, the customer decides to use OAM to authenticate some of the users against an external LDAP store. For this to work, a customer configured an OAMAuthenticator, but was not sure what to select for the Control Flag. What Control Flag should the customer choose?() 

    • A、OPTIONAL
    • B、REQUISITE
    • C、REQUIRED
    • D、SUFFICIENT
    • E、MANDATORY

    正确答案:C

  • 第6题:

    You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()

    • A、functions
    • B、packages
    • C、procedures
    • D、database triggers
    • E、anonymous PL/SQL block

    正确答案:D

  • 第7题:

    单选题
    A retail customer has a database application that is accessed by a large number of people through a web interface from multiple remote locations. Which questions will provide the information necessary to design the best performing storage solution of the following?()
    A

    How many web servers will be connected to the database?

    B

    How many concurrent applications will run against the database?

    C

    How many concurrent users will be accessing the database?

    D

    What are the types of transactions run against the database?


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    A Customer has a functional server deployment solution that uses a combination of disk imaging and application pushing technology. They need to get a working Windows 2003 image for their new servers as soon as possible. What method can achieve this?()
    A

    Install Windows 2003 using the F6 supply Mass Storage Controller option

    B

    Replace Customer’s deployment solution with Tivoli Provisioning Manager for OS Deployment Director Edition

    C

    Deploy Customer’s existing image and use UXSPi to update IBM specific drivers

    D

    Use ServerGuide to install Windows 2003


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    ou are developing a fiscal report for a customer. Your customer has a main office in the United States and a satellite office in Mexico. You need to ensure that when users in the satellite office generate the report, the current date is displayed in Mexican Spanish format.Which code segment should you use?()
    A

    A

    B

    B

    C

    C

    D

    D


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    The pSeries sales representative has done an excellent job in educating the customer on the benefits of working with IBM.  The customer is planning to implement their first ERP application.  This new application will be critical to running their business.  The customer has only a competitor’s UNIX systemcurrently installed.  They are interested in obtaining a proposal from IBM. In addition to the AIX hardware and HACMP software, what else should be included in the IBM proposal for the new ERP solution?()
    A

    I/T services and education to help with the implementation of the hardware and software

    B

    A Supportline specialist to work directly with the customer to manage any issues that arise

    C

    The services required to move the currently installed applications from the competitor’s systems to the IBM systems

    D

    A slimmed down solution to ensure that the IBM solution is less expensive than the competitor’s solution


    正确答案: D
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements apply to dynamic access lists?()
    A

    they offer simpler management in large internetworks.

    B

    you can control logging messages.

    C

    they allow packets to be filtered based on upper-layer session information.

    D

    you can set a time-based security policy.

    E

    they provide a level of security against spoofing.

    F

    they are used to authenticate individual users.


    正确答案: C,A
    解析: 暂无解析

  • 第12题:

    单选题
    A customer calls in, talking constantly without allowing time for the technician to answer or ask questions. The technician decides to place the customer on hold to work on another issue and misses what the customer’s problem was. When the customer is finished explaining the issue, the technician asks the customer to summarize the problem again, which angers the customer. How could the technician have better handled the situation to avoid such a confrontation?()
    A

    The technician should have asked the customer to slow down and allow for a response to a few of the matters brought up in discussion.

    B

    The technician should have allowed the customer to finish completely, and then return to the customer’s first point to build a structured discussion.

    C

    The technician should have transferred the call to a supervisor, as the supervisor is better trained to handle such customers.

    D

    The technician should have only asked closed-ended questions so the customer could not elaborate on the issues and the technician could troubleshoot the issue.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    The pSeries sales representative has done an excellent job in educating the customer on the benefits of working with IBM.  The customer is planning to implement their first ERP application.  This new application will be critical to running their business.  The customer has only a competitor’s UNIX systemcurrently installed.  They are interested in obtaining a proposal from IBM. In addition to the AIX hardware and HACMP software, what else should be included in the IBM proposal for the new ERP solution?()

    • A、I/T services and education to help with the implementation of the hardware and software
    • B、A Supportline specialist to work directly with the customer to manage any issues that arise
    • C、The services required to move the currently installed applications from the competitor’s systems to the IBM systems
    • D、A slimmed down solution to ensure that the IBM solution is less expensive than the competitor’s solution

    正确答案:A

  • 第14题:

    You are designing a Windows Azure web application.  All users authenticate by using their Active Directory Domain Services (AD DS) credentials.  You need to recommend an approach for enabling single sign-on for domain-authenticated users.   Which two actions should you recommend?()

    • A、 Use Forms authenticationto generate claims.
    • B、 Use Active Directory Federation Services (AD FS) to generate claims.
    • C、 Use SqlMembershipProvider in the web application.
    • D、 Use Windows Identity Foundation in the web application.

    正确答案:B,D

  • 第15题:

    When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()

    • A、Third-party due diligence policy review
    • B、Remote Access Policy
    • C、Encryption Policy
    • D、Application change control policy
    • E、Security Personnel policy

    正确答案:A,B,D

  • 第16题:

    A customer calls in, talking constantly without allowing time for the technician to answer or ask questions. The technician decides to place the customer on hold to work on another issue and misses what the customer’s problem was. When the customer is finished explaining the issue, the technician asks the customer to summarize the problem again, which angers the customer. How could the technician have better handled the situation to avoid such a confrontation?()

    • A、The technician should have asked the customer to slow down and allow for a response to a few of the matters brought up in discussion.
    • B、The technician should have allowed the customer to finish completely, and then return to the customer’s first point to build a structured discussion.
    • C、The technician should have transferred the call to a supervisor, as the supervisor is better trained to handle such customers.
    • D、The technician should have only asked closed-ended questions so the customer could not elaborate on the issues and the technician could troubleshoot the issue.

    正确答案:B

  • 第17题:

    You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()

    • A、Monitor thealert.logfile
    • B、Enable server-side SQL tracing for user sessions
    • C、Enable fine-grained auditing for the customer table
    • D、Enable Fine-Grained Access Control (FGAC) for the customer table
    • E、Write a database trigger on the customer table on the SELECT event

    正确答案:D

  • 第18题:

    单选题
    You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()
    A

    functions

    B

    packages

    C

    procedures

    D

    database triggers

    E

    anonymous PL/SQL block


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    A customer has a WebTrade application that initially uses the embedded LDAP to authenticate users. To enhance security, the customer decides to use OAM to authenticate some of the users against an external LDAP store. For this to work, a customer configured an OAMAuthenticator, but was not sure what to select for the Control Flag. What Control Flag should the customer choose?()
    A

    OPTIONAL

    B

    REQUISITE

    C

    REQUIRED

    D

    SUFFICIENT

    E

    MANDATORY


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    A customer server has the maximum local storage installed. The customer plans to share this new storage with other servers. Which of the following provides that server additional storage?()
    A

    Add External Storage via EXP3000

    B

    Replace current storage with more dense drives

    C

    Add External Storage via SAN

    D

    Add storage expansion blade


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    You work as a database administrator for Certkiller .com. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()
    A

    Monitor thealert.logfile

    B

    Enable server-side SQL tracing for user sessions

    C

    Enable fine-grained auditing for the customer table

    D

    Enable Fine-Grained Access Control (FGAC) for the customer table

    E

    Write a database trigger on the customer table on the SELECT event


    正确答案: E
    解析: 暂无解析

  • 第22题:

    单选题
    A company needs additional storage for a block I/O based database application. The application has low I/O bandwidth requirements across the campus. The customer has a TCP/IP infrastructure and is interested in low-cost products that are compatible with its environment. Which technology is most appropriate for this customer?()
    A

    SAN

    B

    FCoE

    C

    FCIP

    D

    iSCSI


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    A customer has an 8-way p650 running an application for about 200 users.  In the past, the requiredamount of memory and processors has increased proportionally to the number of new users.  The customer plans to increase users by 10% each year for the next three years.  Next year, a database will be added to the workload to support the users directly rather than being on a separate machine. What is the most likely result of this projected growth?()
    A

    Disk usage will increase in proportion to memory.

    B

    The new database will demand much more memory.

    C

    Memory demand will increase 10% for the next year.

    D

    Processor demand will increase about 10% for the next year.


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    A customer wants to know what version of DirectX the current workstation has installed. Which of the following command line tools would the customer use?()
    A

    edit

    B

    systeminfo

    C

    gpedit.msc

    D

    dxdiag


    正确答案: B
    解析: 暂无解析