多选题A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()ADisabling connections from named pipes or socket files (depending on the operating system of the server)BEnabling and using SSL for connections to the Mysql databaseCInstalling Mysql on the application server, and running the database and application on the same serverDStarting the server with – bind- address=0.0.0.0 specifiedERunning the server with – skip-networking specifiedFLimiting logins to originate from the application server or the server's subnet'

多选题
A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()
A

Disabling connections from named pipes or socket files (depending on the operating system of the server)

B

Enabling and using SSL for connections to the Mysql database

C

Installing Mysql on the application server, and running the database and application on the same server

D

Starting the server with – bind- address=0.0.0.0 specified

E

Running the server with – skip-networking specified

F

Limiting logins to originate from the application server or the server's subnet'


参考解析

解析: 暂无解析

相关考题:

You have three production databases, HRDB, FINDB, and ORGDB, that use the same ASM instance. At the end of the day, while all three production database instances are running, you execute the following command on the ASM instance :SQL shutdown immediate;What is the result of executing this command?()A. The ASM instance is shut down, but the other instances are still running.B. It results in an error because other database instances are connected to it.C. All the instances, including the ASM instance, are shut down in the IMMEDIATE mode.D. HRDB, FINDB, and ORGDB instances are shut down in the ABORT mode and the ASM instance is shut down in the IMMEDIATE mode.

You execute the following statement in a Microsoft Windows environment. There are no conflicts in the path name definitions.C: \> mysqld – install Mysql56 – defaults – file = C :\my –opts.cnf What is the expected outcome?()A.Mysql is installed as the Windows service name Mysql56, and uses c: \my-opts.cnf as the configuration fileB.An error message is issued because – install is not a valid option for mysqldC.A running Mysql 5.6 installation has its runtime configuration updated with the server variables set in c: \my-opts.cnfD.Mysqld acts as an MSI installer and installs the Mysql 5.6 version, with the c: \my-opts.cnf configuration file

Mysqldump was used to create a single schema backup; Shell mysqldump –u root –p sakila sakila2013.sqlWhich two commands will restore the sakila database without interfering with other running database?()A.Mysql> USE sakila; LOAD DATA INFILE ‘sakila2013.sql‘;B.Shell> mysql –u root –p sakila sakila2013.sqlC.Shell> mysql import –u root –p sakila sakila2013.sqlD.Shell> mysql –u root -p –e ‘use sakila; source sakila2013.sql‘E.Shell> mysql –u root –p –silent < sakila2013.sql

Mysqldump was used to create a single schema backup; Shell mysqldump –u root –p sakila sakila2013.sql Which two commands will restore the sakila database without interfering with other running database?()A、Mysql> USE sakila; LOAD DATA INFILE 'sakila2013.sql';B、Shell> mysql –u root –p sakila sakila2013.sqlC、Shell> mysql import –u root –p sakila sakila2013.sqlD、Shell> mysql –u root -p –e 'use sakila; source sakila2013.sql'E、Shell> mysql –u root –p –silent < sakila2013.sql

Multiple users are trying to telnet to the AIX server. They are able to ping the server successfully, but are getting the following error message:  telnet: connect: A remote host refused an attempted connect operation   Which of the following could be the cause of this problem?()A、The routing table on the AIX server is incorrect.B、The IP address on the network adapter is incorrect.C、The portmap daemon is not running on the AIX server.D、The inetd daemon is not running on the AIX server.

Your database instance is running with full workload after database creation. You have decided to useafixed-sizeundo tablespace. You want to use the Undo Advisor to estimate the capacity of the undotablespace.  Which two factors must you consider before using the Undo Advisor to estimate the capacity of the undotablespace()A、the retention period to support flashbackB、the expected length of the longest-running queryC、the number of undo tablespaces in the databaseD、the size of the Flash Recovery Area for the database instance

Which of the following is a correct statement about Workload Partitions (WPARs)?()A、WPARs use dedicated cores and shared memory.B、WPARs are restricted to using dedicated resources.C、WPARs share the resources of a single AIX instance.D、WPARs use shared cores, memory, and dedicated network adapters.

Company.com has four pSeries servers in their data center and wants to deploy multiple Micro-Partitions.  Which of the following data center servers can be used for this purpose?()A、p5-520 running Virtual I/O ServerB、p690 running AIX 5L V5.3C、p5-510 running AIX 5L V5.2D、p5-520 running two dedicated processor partitions

A medium-sized company with 500 employees has a rapidly growing storage infrastructure with clustered mail, database, and file and print core business applications running on six servers.  Using current direct attached SCSI storage pools to each server leads to inefficient utilization of storage space.They also have a backup device attached to each server.  They want to consolidate their storage and backup infrastructure into a scalable, high availability and high performance solution.  The customer’s top priorities are performance, cost, and availability.   Which of the following backup solutions best satisfies the customer requirements?()A、A DS4000 SAN with flash copy enabled for volume mirroringB、An iSCSI solution with dedicated backup server with SCSI attached tape libraryC、A NAS solution with SCSI direct attached tape library with dedicated backup networkD、A DS4000 SAN with fibre channel attached tape library solution with dedicated backup zone

Which statement must you issue to an already-running Automatic Storage Management (ASM) instance to prevent database instances from connecting to the ASM instance?() A、 ALTER SYSTEM KILL SESSIONB、 ALTER SYSTEM DISCONNECT SESSIONC、 ALTER SYSTEM QUIESCE RESTRICTEDD、 ALTER SYSTEM ENABLE RESTRICTED SESSION

You have a single Automatic Storage Management (ASM) instance running on the node on which your Oracle Database 10g resides. Which ASM instance initialization parameters must be included in the ASM instance initialization parameter file?()A、 INSTANCE_TYPEB、 DB_UNIQUE_NAMEC、 ASM_DISKSTRINGD、 ASM_POWER_LIMIT

What effect should the loss of an index tablespace have on an Oracle instance that is running?()A、 instance hangsB、 instance gets abortedC、 instance continues runningD、 instance gets restarted automatically

With dynamic service registration, which process registers instance information with the listener?()A、SMONB、PMONC、shared serverD、dedicated server

Multiple users are trying to telnet to the AIX server. They are able to ping the server successfully, but are  getting  the  following  error  message:  telnet:  connect:  A remote  host  refused  an  attempted  connect   operation Which of the following options could be the cause of this problem()A、The routing table on the AIX server is incorrect.B、The IP address in the /etc/hosts file is incorrect,C、The portmap daemon is not running on the AIX server.D、The inetd daemon is not running on the AIX server.

A client cannot mount a filesystem from an NFS server.  Which of the following options is the most probable cause for the mount failure?()A、Server is not running  rpc.lockdB、Client is not running the rpc.statdC、Filesystem not exported by the serverD、Client nfsd daemons are all inoperative

多选题A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()ADisabling connections from named pipes or socket files (depending on the operating system of the server)BEnabling and using SSL for connections to the Mysql databaseCInstalling Mysql on the application server, and running the database and application on the same serverDStarting the server with – bind- address=0.0.0.0 specifiedERunning the server with – skip-networking specifiedFLimiting logins to originate from the application server or the server's subnet'

多选题You want to shutdown a running Mysql Server cleanly. Which three commands that are valid on either Windows or Linux will achieve this?()AShell> mysqladmin –u root –p shutdownBShell> nmc mysql shutdownCMysql> STOP PROCESS mysqldDShell> /etc/init.d/mysql stopEShell> service mysql safe_exitFShell> pkill –u mysql mysqld_safeGShell> net stop mysql

单选题Your company has a server that runs Windows Server 2008 R2. The server runs an instance of  Active Directory Lightweight Directory Services (AD LDS).     You need to replicate the AD LDS instance on a test computer that is located on the network.     What should you do()ARun the repadmin /kcc  command on the test computer.BCreate a naming context by running the Dsmgmt command on the test computer.CCreate a new directory partition by running the Dsmgmt command on the test computer.DCreate and install a replica by running the AD LDS Setup wizard on the test computer.

单选题View the Exhibit to examine the output produced by the following query at three different times since thedatabase instance started and has experienced workloads of different capacities:SQL SELECT substr(component, 0, 10) COMP, current_size CS, user_specified_size US FROM v$memory_dynamic_componentsWHERE current_size!=0;What do you infer from this()AThe database instance is running with manual PGA management.BThe database instance is running with manual shared memory management.CThe database instance has the MEMORY_TARGET value set to a nonzero value.DAll sessions are connected to the database instance in dedicated mode, and no RMAN or parallel queryoperations have been performed

单选题You execute the following statement in a Microsoft Windows environment. There are no conflicts in the path name definitions. C: /> mysqld – install Mysql56 – defaults – file = C :/my –opts.cnf What is the expected outcome?()AMysql is installed as the Windows service name Mysql56, and uses c: /my-opts.cnf as the configuration fileBAn error message is issued because – install is not a valid option for mysqldCA running Mysql 5.6 installation has its runtime configuration updated with the server variables set in c: /my-opts.cnfDMysqld acts as an MSI installer and installs the Mysql 5.6 version, with the c: /my-opts.cnf configuration file

单选题What effect should the loss of an index tablespace have on an Oracle instance that is running?()A instance hangsB instance gets abortedC instance continues runningD instance gets restarted automatically

单选题You need to design the consolidation strategy for the Promotions and Partners databases. You want to choose a strategy that results in the best database performance while maintaining the permissions of end users in each database.What consolidation strategy should you choose?()APlace each database in a separate instance running on SQL2.BPlace each database in a separate instance running on SQL3.CPlace both databases in a single instance running on SQL2.DPlace both databases in a single instance running on SQL3.

单选题You use—login-path to access a MySQL server on a Linux installation. Which statement is true about the – login-path option that is created by using mysql_config_editor?()AAll system users have access to the MySQL server via—login path localBlogin-path can be used only for MySQL servers running on a local machineClogin-path allows you to provide login credentials without passing clear text passwords on the command lineDWhen using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later

单选题Multiple users are trying to telnet to the AIX server. They are able to ping the server successfully, but are  getting  the  following  error  message:  telnet:  connect:  A remote  host  refused  an  attempted  connect   operation Which of the following options could be the cause of this problem()AThe routing table on the AIX server is incorrect.BThe IP address in the /etc/hosts file is incorrect,CThe portmap daemon is not running on the AIX server.DThe inetd daemon is not running on the AIX server.

单选题You have a single Automatic Storage Management (ASM) instance running on the node on which your Oracle Database 10g resides. Which ASM instance initialization parameters must be included in the ASM instance initialization parameter file?()A INSTANCE_TYPEB DB_UNIQUE_NAMEC ASM_DISKSTRINGD ASM_POWER_LIMIT

单选题A system administrator has a pSeries p5-520 2-way with AIX 5L V5.2 with a peak utilization of 50%. There is a request to add a new Web server for a small department. Which of the following solutions is the best fit for this environment?()ACreate a dedicated LPAR for the existing workload and a Micro-Partition for the Web server. BCreate a dedicated LPAR for the existing workload and a dedicated LPAR for the Web server.CCreate a Micro-Partition for the existing workload and a dedicated LPAR for the Web server.DCreate a Micro-Partition for the existing workload and a Micro-Partition for the Web server.

单选题You work as an application developer at Certkiller .com. You have created a Windows service application for the purpose of monitoring the number of active service requests running on Certkiller .com’s server.  You want to configure this Windows service application to produce a report every ten minutes. You start by placing the reporting logic in the GenerateReport method of this Windows service.You want to create a Timer object that invokes this method every ten minutes.What should you do? ()A AB BC CD D

单选题You have forgotten the root user account password. You decide to reset the password and execute the following: Shell> /etc/init.d/mysql stop Shell> /etc/init.d/mysql start – skip-grant tables Which additional argument makes this operation safer?()A–skip-networking, to prohibit access from remote locationsB–reset-grant-tables, to start the server with only the mysql database accessibleC–read-only,to set all data to read-only except for super usersD–old-passwords, to start Mysql to use the old password format while running without the grant tables