单选题As the Certkiller administrator you had installed a read-only domain controller (RODC) server at remote location.  The remote location doesn’t provide enough physical security for the server.  What should you do to allow administrative accounts to replicate authentication information to Read-Only Domain Controllers()ARemove any administrative accounts from RODC’s groupBAdd administrative accounts to the domain Allowed RODC Password Replication groupCSet the Deny on Receive as permission for administrative accounts on the RODC computer account security tab for the Group Policy Object (GPO)DConfigure a new Group Policy Object (GPO) with the Account Lockout settings enabled. Link the GPO to the remote location. Activate the Read Allow and the Apply group policy Allow permissions for the administrators on the Security tab for the GPO.ENone of the above

单选题
As the Certkiller administrator you had installed a read-only domain controller (RODC) server at remote location.  The remote location doesn’t provide enough physical security for the server.  What should you do to allow administrative accounts to replicate authentication information to Read-Only Domain Controllers()
A

Remove any administrative accounts from RODC’s group

B

Add administrative accounts to the domain Allowed RODC Password Replication group

C

Set the Deny on Receive as permission for administrative accounts on the RODC computer account security tab for the Group Policy Object (GPO)

D

Configure a new Group Policy Object (GPO) with the Account Lockout settings enabled. Link the GPO to the remote location. Activate the Read Allow and the Apply group policy Allow permissions for the administrators on the Security tab for the GPO.

E

None of the above


参考解析

解析: 暂无解析

相关考题:

Certkiller .com has a server named Certkiller -SR05 that has numerous processors installed.You have been given the task of developing an application that displays certain clock speed statisticson all processors installed on Certkiller -SR05.You need to ensure that this requirement is fully satisfied.What should you do?()A.B.C.D.

Certkiller.com has employed you as a system administrator. You are in the process of creating anASP.NET application using Microsoft.NET Framework v3.5. This application will be hosted on aserver named CERTKILLER-SR01. CERTKILLER-SR01 is configured to run Microsoft IIS 5.0.  You are assigned a computer named CERTKILLER-WS02. You make use of CERTKILLER-WS02to log on to the companies domain with an account named CKUser. CERTKILLER-SR01 andCERTKILLER-WS02 are both members of the Certkiller.com domain. To ensure productivity youneed to establish the necessary permissions to allow remote debugging.  What should you do?()A、Your best option would be to ensure that the Remote Debugging Monitor is set to make use of Windows Authentication.B、Your best option would be to ensure that the CKUser account is added to the domainAdministrators group.C、Your best option would be to ensure that the ASP.NET worker process is changed onCERTKILLER-SR01 to run as the local Administrator account.D、Your best option would be to ensure that the CKUser account is added to the localAdministrators group on CERTKILLER-SR01.

You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode and you want to perform a backup. Which type of backup would be appropriate in this case? ()A、Hot backupB、Online backupC、consistent backupD、incremental backupE、inconsistent backup

You work as a database administrator for Certkiller .com. In your organization, you have four databases, Certkiller DB01, Certkiller DB02, Certkiller DB03, and Certkiller DB04, which are located in Berlin, Frankfurt,Rammstein, and Munich respectively, and which were created using Database Configuration Assistant (DBCA).  You want to perform administrative tasks on these databases that include startup and shutdown, taking regular backups, and so on, fromFrankfurtusing Oracle tools. Which Oracle file would you enable to perform this task?()A、Control fileB、Password fileC、Parameter fileD、Online redo log fileE、Listener controller fileF、Server parameter file

You work as a database administrator for Certkiller .com. As a result of performance analysis, you created an index on theprod_namecolumn of the  Certkiller prodtable, which contains about ten thousand rows. Later, you updated a product name in the table.  How does this change affect the index?()A、A leaf will be marked as invalid.B、An update in a leaf row takes place.C、The index will be updated automatically at commit.D、A leaf row in the index will be deleted and inserted.E、The index becomes invalid when you make any updates

You work as a database administrator for Certkiller .com. You decided to manage client and server connections using Local Naming method in Certkiller .com. When you try to connect to the database you get the following error: ERROR:  ORA-12154:TNS:couldnot resolve service name  Which network configuration files would you look into to resolve this error?()A、snmp.oraB、names.oraC、spfile.oraD、sqlnet.oraE、listener.oraF、tnsnames.ora

Certkiller .com has a main office and a branch office. Certkiller .com’s network consists of a single Active Directory forest. Some of the servers in the network run Windows Server 2008 and the rest run Windows server 2003.  You are the administrator at Certkiller .com. You have installed Active Directory Domain Services (AD DS) on a computer that runs Windows Server 2008. The branch office is located in a physically insecure place. It has not IT personnel onsite and there are no administrators over there. You need to setup a Read-Only Domain Controller (RODC) on the Server Core installation computer in the branch office. What should you do to setup RODC on the computer in branch office()A、Execute an attended installation of AD DSB、Execute an unattended installation of AD DSC、Execute RODC through AD DSD、Execute AD DS by using deploying the image of AD DSE、none of the above

Certkiller .com has organizational units in the Active Directory domain. There are 10 servers in the organizational unit called Security. As an administrator at Certkiller .com, you generate a Group Policy Object (GPO) and link it to the Security organizational unit. What should you do to monitor the network connections to the servers in Security organizational unit()A、Start the Audit Object Access optionB、Start the Audit System Events optionC、Start the Audit Logon Events optionD、Start the Audit process tracking optionE、All of the above

As an administrator at Certkiller.com, you have installed an Active Directory forest that has a single domain. You have installed an Active Directory Federation services (AD FS) on the domain member server.  What should you do to configure AD FS to make sure that AD FS token contains information from the active directory domain()A、Add a new account store and configure it.B、Add a new resource partner and configure itC、Add a new resource store and configure itD、Add a new administrator account on AD FS and configure itE、None of the above

单选题You work as a database administrator for Certkiller .com. As a result of performance analysis, you created an index on theprod_namecolumn of the  Certkiller prodtable, which contains about ten thousand rows. Later, you updated a product name in the table.  How does this change affect the index?()AA leaf will be marked as invalid.BAn update in a leaf row takes place.CThe index will be updated automatically at commit.DA leaf row in the index will be deleted and inserted.EThe index becomes invalid when you make any updates

单选题You work as a database administrator for Certkiller .com. You determine that archiving was not successful in one of thedestinators. You want to check the alert log file for more information on this. Which initialization parameter gives you the location of the alert log file?()AUSER_DUMP_DESTBCORE_DUMP_DESTCALERT_LOG_DESTDALERT_DUMP_DESTETRACE_DUMP_DESTFBACKGROUND_DUMP_DEST

单选题You work as a database administrator for Certkiller .com. Users in the Certkiller .com PROD database complain about the slow response of transactions. While investigating the reason you find that the transactions are waiting for the undo segments to be available, and undo retention has been set to zero. What would you do to overcome this problem?()AIncrease the undo returnBCreate more undo segmentsCCreate another undotablespaceDIncrease the size of the undotablespace

单选题You work as a database administrator for Certkiller .com. You find that reports are running for a long time in your data warehousing applications. You suspect a lack of indexes is the reason for the performance degradation.  Which advisory component would you refer to, in order to determine the appropriate indexes?()AMemory AdvisorsBSegment AdvisorsCSQL Tuning and Access AdvisorsDAutomated Workload Repository (AWR)EAutomatic Database Diagnostic Monitor (ADDM)

单选题Certkiller .com has a domain controller that runs Windows Server 2008. The Certkiller .com network boosts 40 Windows Vista client machines. As an administrator at Certkiller .com, you want to deploy Active Directory Certificate service (AD CS) to authorize the network users by issuing digital certificates.  What should you do to manage certificate settings on all machines in a domain from one main location()AConfigure Enterprise CA certificate settingsBConfigure Enterprise trust certificate settingsCConfigure Advance CA certificate settingsDConfigure Group Policy certificate settingsEAll of the above

单选题You work as a database administrator for Certkiller .com. You have been asked to use a centralized administrative tool to administer your database servers and application servers. In order to achieve the objective, which component would you configure on each database server?()ADatabase ControlBManagement ServerCManagement RepositoryDApplication Server ControlEOracle Management Agent

单选题As the Certkiller administrator you had installed a read-only domain controller (RODC) server at remote location.  The remote location doesn’t provide enough physical security for the server.  What should you do to allow administrative accounts to replicate authentication information to Read-Only Domain Controllers()ARemove any administrative accounts from RODC’s groupBAdd administrative accounts to the domain Allowed RODC Password Replication groupCSet the Deny on Receive as permission for administrative accounts on the RODC computer account security tab for the Group Policy Object (GPO)DConfigure a new Group Policy Object (GPO) with the Account Lockout settings enabled. Link the GPO to the remote location. Activate the Read Allow and the Apply group policy Allow permissions for the administrators on the Security tab for the GPO.ENone of the above

多选题You work as a database administrator for Certkiller .com. You decided to manage client and server connections using Local Naming method in Certkiller .com. When you try to connect to the database you get the following error: ERROR:  ORA-12154:TNS:couldnot resolve service name  Which network configuration files would you look into to resolve this error?()Asnmp.oraBnames.oraCspfile.oraDsqlnet.oraElistener.oraFtnsnames.ora

单选题You work as a database administrator for Certkiller .com. You are using three database, Certkiller DB01, Certkiller DB02, and Certkiller DB03, on different host machines in your development environment. The database serverconfiguration, such as IP address and listener port number, change frequently due to development requirements, and you havethe task of notifying the developers of the changes. Which connection method would you use to overcome this overhead?()AHost namingBLocal namingCEasy ConnectDExternal namingEdirectory naming

单选题You work as a database administrator for Certkiller .com. In the Certkiller PRODUCTION database you have granted RESUMABLE system privilege to the CONNECT role.Resumablespace operation has been enabled for all user session. You want users NOT to be aware of any kind of space-related problems while performing transactions. Instead, you want the problem to be resolved by a database trigger automatically. Which combination of triggering time and event would you use to achieve this objective?()AAFTER CREATEBAFTER SUSPENDCBEFORE CREATEDAFTER TRUNCATEEBEFORE SUSPENDFAFTER INSERT OR DELETE OR DELETEGBEFORE INSERT OR DELETE OR DELETE

单选题You work as a database administrator for Certkiller .com. While loading data into the Certkiller STAFF table using Oracle Enterprise Manager 10g Database Control, you find the status of the job as failed. On further investigation, you find the following error message in the output log: ORA-01653 unable to extend table HR. Certkiller STAFF by 8 intablespaceUSERS Which task would you perform to load the data successfully without affecting the users who are accessing the table?()ARestart the database instance and run the jobBTruncate the Certkiller STAFF table and run the jobCDelete all rows from the Certkiller STAFF table and run the jobDIncrease the size of the USERStablespacethe and run the jobEIncrease the size of the database default permanenttablespaceand run the job

单选题Certkiller.com has a server with Active Directory Rights Management Services (AD RMS) server installed. Users have computers with Windows Vista installed on them with an Active Directory domain installed at Windows Server 2003 functional level. As an administrator at Certkiller.com, you discover that the users are unable to benefit from AD RMS to protect their documents. You need to configure AD RMS to enable users to use it and protect their documents. What should you do to achieve this functionality()AConfigure an email account in Active Directory Domain Services (AD DS) for each user.BAdd and configure ADRMSADMIN account in local administrators group on the user computersCAdd and configure the ADRMSSRVC account in AD RMS server’s local administrator groupDReinstall the Active Directory domain on user computersEAll of the above

多选题You work as a database administrator for Certkiller .com. One of the database users accidentally deleted all the rows of a critical table and committed the delete at 1:30 p.m. You senior database administrator, Certkiller, asks you to retrieve the lost data. Which two actions would you use to ensure that there is no impact on other connected users while retrieving the deleted rows?()AUse a flashback query to retrieve the rows that were deletedBUseconventialincremental export and then import the affected objectCShutdown the database inNORMALmode and restart the database instanceDUse DBMS_META package to reconstruct the object using undo segmentsEUseTablespacePoint in Time Recovery (TSPITR) method to recover the table and the dataFUse Oracle DataPumptwithflashback_timeoption toentableflashback export and then import the affected object.

单选题You work as a database administrator for Certkiller .com. Client connection requests are failing because the listener is not responding. You want to forward client connect requests to another listener if one listener is not responding. How do you achieve this?()AEnable instance failoverBConfigure shared serverCEnable database failoverDEnable connect-time failoverEEnable Transparent Application Failover (TAF)

单选题You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()AThe SetupUser profileBThe Default User profileCThe Administrator profileDThe System profileEThe All Users profile

单选题You are an administrator at Certkiller .com. Certkiller has a network of 5 member servers acting as file servers. It has an Active Directory domain. You have installed a software application on the servers. As soon as the application is installed, one of the member servers shuts down itself. To trace and rectify the problem, you create a Group Policy Object (GPO). You need to change the domain security settings to trace the shutdowns and identify the cause of it. What should you do to perform this task()ALink the GPO to the domain and enable System Events optionBLink the GPO to the domain and enable Audit Object Access optionCLink the GPO to the Domain Controllers and enable Audit Object Access optionDLink the GPO to the Domain Controllers and enable Audit Process tracking optionEPerform all of the above actions

单选题You work as a database administrator for Certkiller .com. In your organization, you have four databases, Certkiller DB01, Certkiller DB02, Certkiller DB03, and Certkiller DB04, which are located in Berlin, Frankfurt,Rammstein, and Munich respectively, and which were created using Database Configuration Assistant (DBCA).  You want to perform administrative tasks on these databases that include startup and shutdown, taking regular backups, and so on, fromFrankfurtusing Oracle tools. Which Oracle file would you enable to perform this task?()AControl fileBPassword fileCParameter fileDOnline redo log fileEListener controller fileFServer parameter file

多选题You work as a database administrator for Certkiller .com. Your listener process, L1,is currently listening to three databases:CertK INDB04,Certkiller DB05 and Certkiller DB06. Using Database Configuration Assistant (DBCA) you create one more database,Certkiller DB07,and enable dynamic registration.  Which two commands of Listener Control Utility (lsnrct1) would you use to determine whether the dynamic registration occurred for the database, Certkiller DB07, with the L1 listener process?()ASHOW L1BSPAWN L1CSTATUS L1DSERVICES L1ESTATUS LISTENERFSERVICES LISTENERGSHOWcurrent_listener

单选题You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode and you want to perform a backup. Which type of backup would be appropriate in this case? ()AHot backupBOnline backupCconsistent backupDincremental backupEinconsistent backup