单选题A customer has a WebTrade application that initially uses the embedded LDAP to authenticate users. To enhance security, the customer decides to use OAM to authenticate some of the users against an external LDAP store. For this to work, a customer configured an OAMAuthenticator, but was not sure what to select for the Control Flag. What Control Flag should the customer choose?()AOPTIONALBREQUISITECREQUIREDDSUFFICIENTEMANDATORY
单选题
A customer has a WebTrade application that initially uses the embedded LDAP to authenticate users. To enhance security, the customer decides to use OAM to authenticate some of the users against an external LDAP store. For this to work, a customer configured an OAMAuthenticator, but was not sure what to select for the Control Flag. What Control Flag should the customer choose?()
A
OPTIONAL
B
REQUISITE
C
REQUIRED
D
SUFFICIENT
E
MANDATORY
参考解析
解析:
暂无解析
相关考题:
A frustrated and angry customer calls in with a system that does not work. Which of the following is the FIRST course of action for a technician to take?() A. Transfer the customer to another technician, who can allocate more time to the issue.B. Maintain a positive attitude and offer them the cheapest solution possible to satisfy them.C. Listen to what the customer has to say and calmly recommend the best course of action.D. Use technical language to demonstrate knowledge and expertise to the customer.
You are the administrator of a SQL Server 2000 computer. One of the databases on the server contains a table named complaints. This table is used to store information about customer complaints.The customer service representatives in your company add and edit the information in the complaints table. They work with this table by using a number of client applications, including a web-based application and a Microsoft Windows 32-bit application.The customer service manager discovers that some customer complaints are marked as closed before they are resolved to the customer’s satisfaction.You need to notify the customer service manager whenever a complaint is marked as closed. You do not want to make any changes to the client applications.What should you do?A.Create an UPDATE trigger that sends an e-mail message.B.Create a stored procedure that sends an e-mail message. Use the stored procedures to make changes to the data.C.Create a user-defined function that sends an e-mail message. Use the function to make changes to the data.D.Create a rule that validates data entry. Bind the rule to the CompliantClosed column.
Which two statements apply to dynamic access lists?() A.they offer simpler management in large internetworks.B.you can control logging messages.C.they allow packets to be filtered based on upper-layer session information.D.you can set a time-based security policy.E.they provide a level of security against spoofing.F.they are used to authenticate individual users.
Your customer wants to build a network for a financial trading floor that has a requirement formultiple high-value transactions, which are also vital to the customer. What are the two mostcritical requirements?() (Choose two.)A、no single point of failureB、trading database server locationC、redundant application servers locationD、deterministic response to all failuresE、determine which protocol to use
A customer wants to know what version of DirectX the current workstation has installed. Which of the following command line tools would the customer use?()A、editB、systeminfoC、gpedit.mscD、dxdiag
The pSeries sales representative has done an excellent job in educating the customer on the benefits of working with IBM. The customer is planning to implement their first ERP application. This new application will be critical to running their business. The customer has only a competitor’s UNIX systemcurrently installed. They are interested in obtaining a proposal from IBM. In addition to the AIX hardware and HACMP software, what else should be included in the IBM proposal for the new ERP solution?()A、I/T services and education to help with the implementation of the hardware and softwareB、A Supportline specialist to work directly with the customer to manage any issues that ariseC、The services required to move the currently installed applications from the competitor’s systems to the IBM systemsD、A slimmed down solution to ensure that the IBM solution is less expensive than the competitor’s solution
A Customer has a functional server deployment solution that uses a combination of disk imaging and application pushing technology. They need to get a working Windows 2003 image for their new servers as soon as possible. What method can achieve this?()A、Install Windows 2003 using the F6 supply Mass Storage Controller optionB、Replace Customer’s deployment solution with Tivoli Provisioning Manager for OS Deployment Director EditionC、Deploy Customer’s existing image and use UXSPi to update IBM specific driversD、Use ServerGuide to install Windows 2003
You are designing a Windows Azure web application. All users authenticate by using their Active Directory Domain Services (AD DS) credentials. You need to recommend an approach for enabling single sign-on for domain-authenticated users. Which two actions should you recommend?()A、 Use Forms authenticationto generate claims.B、 Use Active Directory Federation Services (AD FS) to generate claims.C、 Use SqlMembershipProvider in the web application.D、 Use Windows Identity Foundation in the web application.
A customer has an 8-way p650 running an application for about 200 users. In the past, the requiredamount of memory and processors has increased proportionally to the number of new users. The customer plans to increase users by 10% each year for the next three years. Next year, a database will be added to the workload to support the users directly rather than being on a separate machine. What is the most likely result of this projected growth?()A、Disk usage will increase in proportion to memory.B、The new database will demand much more memory.C、Memory demand will increase 10% for the next year.D、Processor demand will increase about 10% for the next year.
When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()A、Third-party due diligence policy reviewB、Remote Access PolicyC、Encryption PolicyD、Application change control policyE、Security Personnel policy
A frustrated and angry customer calls in with a system that does not work. Which of the following is the FIRST course of action for a technician to take?()A、Transfer the customer to another technician, who can allocate more time to the issue.B、Maintain a positive attitude and offer them the cheapest solution possible to satisfy them.C、Listen to what the customer has to say and calmly recommend the best course of action.D、Use technical language to demonstrate knowledge and expertise to the customer.
A customer calls in, talking constantly without allowing time for the technician to answer or ask questions. The technician decides to place the customer on hold to work on another issue and misses what the customer’s problem was. When the customer is finished explaining the issue, the technician asks the customer to summarize the problem again, which angers the customer. How could the technician have better handled the situation to avoid such a confrontation?()A、The technician should have asked the customer to slow down and allow for a response to a few of the matters brought up in discussion.B、The technician should have allowed the customer to finish completely, and then return to the customer’s first point to build a structured discussion.C、The technician should have transferred the call to a supervisor, as the supervisor is better trained to handle such customers.D、The technician should have only asked closed-ended questions so the customer could not elaborate on the issues and the technician could troubleshoot the issue.
A customer has a WebTrade application that initially uses the embedded LDAP to authenticate users. To enhance security, the customer decides to use OAM to authenticate some of the users against an external LDAP store. For this to work, a customer configured an OAMAuthenticator, but was not sure what to select for the Control Flag. What Control Flag should the customer choose?() A、OPTIONALB、REQUISITEC、REQUIREDD、SUFFICIENTE、MANDATORY
You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()A、Monitor thealert.logfileB、Enable server-side SQL tracing for user sessionsC、Enable fine-grained auditing for the customer tableD、Enable Fine-Grained Access Control (FGAC) for the customer tableE、Write a database trigger on the customer table on the SELECT event
You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()A、functionsB、packagesC、proceduresD、database triggersE、anonymous PL/SQL block
单选题You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()AfunctionsBpackagesCproceduresDdatabase triggersEanonymous PL/SQL block
单选题A retail customer has a database application that is accessed by a large number of people through a web interface from multiple remote locations. Which questions will provide the information necessary to design the best performing storage solution of the following?()AHow many web servers will be connected to the database?BHow many concurrent applications will run against the database?CHow many concurrent users will be accessing the database?DWhat are the types of transactions run against the database?
单选题A customer has a WebTrade application that initially uses the embedded LDAP to authenticate users. To enhance security, the customer decides to use OAM to authenticate some of the users against an external LDAP store. For this to work, a customer configured an OAMAuthenticator, but was not sure what to select for the Control Flag. What Control Flag should the customer choose?()AOPTIONALBREQUISITECREQUIREDDSUFFICIENTEMANDATORY
单选题A Customer has a functional server deployment solution that uses a combination of disk imaging and application pushing technology. They need to get a working Windows 2003 image for their new servers as soon as possible. What method can achieve this?()AInstall Windows 2003 using the F6 supply Mass Storage Controller optionBReplace Customer’s deployment solution with Tivoli Provisioning Manager for OS Deployment Director EditionCDeploy Customer’s existing image and use UXSPi to update IBM specific driversDUse ServerGuide to install Windows 2003
单选题A customer server has the maximum local storage installed. The customer plans to share this new storage with other servers. Which of the following provides that server additional storage?()AAdd External Storage via EXP3000BReplace current storage with more dense drivesCAdd External Storage via SANDAdd storage expansion blade
单选题ou are developing a fiscal report for a customer. Your customer has a main office in the United States and a satellite office in Mexico. You need to ensure that when users in the satellite office generate the report, the current date is displayed in Mexican Spanish format.Which code segment should you use?()A AB BC CD D
单选题You work as a database administrator for Certkiller .com. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()AMonitor thealert.logfileBEnable server-side SQL tracing for user sessionsCEnable fine-grained auditing for the customer tableDEnable Fine-Grained Access Control (FGAC) for the customer tableEWrite a database trigger on the customer table on the SELECT event
单选题The pSeries sales representative has done an excellent job in educating the customer on the benefits of working with IBM. The customer is planning to implement their first ERP application. This new application will be critical to running their business. The customer has only a competitor’s UNIX systemcurrently installed. They are interested in obtaining a proposal from IBM. In addition to the AIX hardware and HACMP software, what else should be included in the IBM proposal for the new ERP solution?()AI/T services and education to help with the implementation of the hardware and softwareBA Supportline specialist to work directly with the customer to manage any issues that ariseCThe services required to move the currently installed applications from the competitor’s systems to the IBM systemsDA slimmed down solution to ensure that the IBM solution is less expensive than the competitor’s solution
单选题A company needs additional storage for a block I/O based database application. The application has low I/O bandwidth requirements across the campus. The customer has a TCP/IP infrastructure and is interested in low-cost products that are compatible with its environment. Which technology is most appropriate for this customer?()ASANBFCoECFCIPDiSCSI
多选题Which two statements apply to dynamic access lists?()Athey offer simpler management in large internetworks.Byou can control logging messages.Cthey allow packets to be filtered based on upper-layer session information.Dyou can set a time-based security policy.Ethey provide a level of security against spoofing.Fthey are used to authenticate individual users.
单选题A customer has an 8-way p650 running an application for about 200 users. In the past, the requiredamount of memory and processors has increased proportionally to the number of new users. The customer plans to increase users by 10% each year for the next three years. Next year, a database will be added to the workload to support the users directly rather than being on a separate machine. What is the most likely result of this projected growth?()ADisk usage will increase in proportion to memory.BThe new database will demand much more memory.CMemory demand will increase 10% for the next year.DProcessor demand will increase about 10% for the next year.
单选题A customer calls in, talking constantly without allowing time for the technician to answer or ask questions. The technician decides to place the customer on hold to work on another issue and misses what the customer’s problem was. When the customer is finished explaining the issue, the technician asks the customer to summarize the problem again, which angers the customer. How could the technician have better handled the situation to avoid such a confrontation?()AThe technician should have asked the customer to slow down and allow for a response to a few of the matters brought up in discussion.BThe technician should have allowed the customer to finish completely, and then return to the customer’s first point to build a structured discussion.CThe technician should have transferred the call to a supervisor, as the supervisor is better trained to handle such customers.DThe technician should have only asked closed-ended questions so the customer could not elaborate on the issues and the technician could troubleshoot the issue.
单选题A customer wants to know what version of DirectX the current workstation has installed. Which of the following command line tools would the customer use?()AeditBsysteminfoCgpedit.mscDdxdiag