多选题You enabled an audit policy by issuing the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT; SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM; For which database users and for which executions is the audit policy now active? ()ASYS, SYSTEMBSCOTTCOnly for successful executionsDOnly for failed executionsEBoth successful and failed executions

多选题
You enabled an audit policy by issuing the following statements: SQL> AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT; SQL> AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM; For which database users and for which executions is the audit policy now active? ()
A

SYS, SYSTEM

B

SCOTT

C

Only for successful executions

D

Only for failed executions

E

Both successful and failed executions


参考解析

解析: 暂无解析

相关考题:

You enabled an audit policy by issuing the following statements:SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT;SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM;For which database users and for which executions is the audit policy now active? ()A. SYS, SYSTEMB. SCOTTC. Only for successful executionsD. Only for failed executionsE. Both successful and failed executions

You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements:SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT;For which database users is the audit policy now active?()A. All users except SYSB. All users except SCOTTC. All users except sys and SCOTTD. All users except sys, system, and SCOTT

You have a computer that runs Windows 7. You need to record when an incoming connection is allowedthrough Windows firewall. What should you do?()A、In Local Group Policy, modify the audit policy.B、In Local Group Policy, modify the system audit policy.C、From the Windows Firewall with Advanced Security properties, set the logging settings to Log successfulconnections.D、From the Windows Firewall with Advanced Security properties, set the Data Protection (Quick Mode)IPSec settings to Advanced.

You installed Oracle Database 11g afresh. Which statements are true regarding the default audit settings in this database?() A、 The audit trail is stored in an operating system file.B、 Auditing is disabled for all privileges.C、 The audit trail is stored in the database.D、 Auditing is enabled for all privileges.E、 Auditing is enabled for certain privileges related to database security.

You enabled an audit policy by issuing the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT; SQL AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM; For which database users and for which executions is the audit policy now active? ()A、SYS, SYSTEMB、SCOTTC、Only for successful executionsD、Only for failed executionsE、Both successful and failed executions

You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A、All users except SYSB、All users except SCOTTC、All users except sys and SCOTTD、All users except sys, system, and SCOTT

Your network contains an Active Directory domain. All domain controllers run Windows Server 2008  R2. Client computers run either Windows 7 or Windows Vista Service Pack 2 (SP2).  You need to audit user access to the administrative shares on the client computers.   What should you do()A、Deploy a logon script that runs Icacls.exe.B、Deploy a logon script that runs Auditpol.exe.C、From the Default Domain Policy, modify the Advanced Audit Policy Configuration.D、From the Default Domain Controllers Policy, modify the Advanced Audit Policy Configuration.

Your network consists of a single Active Directory domain. All domain controllers run Windows  Server 2008 R2.     The Audit account management policy setting and Audit directory services access setting are  enabled for the entire domain.     You need to ensure that changes made to Active Directory objects can be logged. The logged  changes must include the old and new values of any attributes.     What should you do()A、Enable the Audit account management policy in the Default Domain Controller Policy.B、Run auditpol.exe and then configure the Security settings of the Domain Controllers OU.C、Run auditpol.exe and then enable the Audit directory service access setting in the Default Domain policy.D、From the Default Domain Controllers policy, enable the Audit directory service access setting and enable directory

You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged.  What should you do?()A、Start the Problem Steps Recorder.B、From Event Viewer, modify the properties of the Security log.C、From the local Group Policy, configure the Audit object access setting.D、From the local Group Policy, configure the Audit directory service Access setting.

Your network contains an Active Directory domain named contoso.com. All domain controllers  and member servers run Windows Server 2008. All client computer run Windows 7.  From a client computer, you create an audit policy by using the Advanced Audit Policy  Configuration settings in the Default Domain Policy Group Policy object (GPO).   You discover that the audit policy is not applied to the member servers.    The audit policy is  applied to the client computers.   You need to ensure that the audit policy is applied to all member servers and all client computers.     What should you do()A、Add a WMI filter to the Default Domain Policy GPOB、Modify the security settings of the Default Domain Policy GPOC、Configure a startup script that runs auditpol.exe on the member servers.D、Configure a startup script that runs auditpol.exe on the domain controllers.

Your company has deployed network access protection (NAP) enforcement for VPNs. You need to ensure that the health of all clients can be monitored and reported. What should you do?()A、Create a group policy object (GPO) that enabled security center and link the policy to the domain.B、Create a group policy object (GPO) that enabled security center and link the policy to the domain controllers organizational unit (OU).C、Create a group policy object (GPO) and set the require trusted path for credential entry option to enabled. Link the policy to the domain.D、Create a group policy object (GPO) and set the require trusted path for credential entry option to Enabled. Link the policy to the domain controllers organizational unit (OU).

Your network contains an Active Directory domain. All servers run Windows Server 2008 R2.   You need to audit the deletion of registry keys on each server.   What should you do()A、From Audit Policy, modify the Object Access settings and the Process Tracking settings.B、From Audit Policy, modify the System Events settings and the Privilege Use settings.C、From Advanced Audit Policy Configuration, modify the System settings and the Detailed Tracking  settings.D、From Advanced Audit Policy Configuration, modify the Object Access settings and the Global Object  Access Auditing settings.

You need to identify each help desk user who bypasses the new corporate security policy. What should you do?()A、Configure Audit Special Logon and define Special Groups.B、Configure Audit Other Privilege Use Events and define Special Groups.C、Configure Audit Sensitive Privilege Use and configure auditing for the HelpDesk group.D、Configure Audit Object Access and modify the auditing settings for the HelpDesk group.

Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()A、In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.B、In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.C、In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.D、In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.

单选题You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy: CONFIGURE RETENTION POLICY TO REDUNDANCY 3; Which statement is true?()AThe command fails because you cannot configure a redundancy-based retention policy when backup optimization is enabledBBackup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upCBackup optimization is permanently disabledDBackup optimization is temporarily disabled because a redundancy-based retention policy is specified

单选题You have enabled backup optimization in RMAN. You issue the following RMAN command to configure a redundancy-based retention policy:   CONFIGURE RETENTION POLICY TO REDUNDANCY 3;   Which statement is true?()A The command fails because you cannot configure a redundancy-based retention policy when backup  optimization is enabledB Backup optimization is performed, but RMAN considers the redundancy-based retention policy when it determines which datafiles should be backed upC Backup optimization is permanently disabledD Backup optimization is temporarily disabled because a redundancy-based retention policy is specified

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 35 Windows Server 2003 computers; 3,000 Windows XP Professional computers; and 2,200 Windows 2000 Professional computers.  The written company security policy states that all computers in the domain must be examined, with the following goals:  (1)to find out whether all available security updates are present   (2)to find out whether shared folders are present  to record the file system type on each hard disk   You need to provide this security assessment of every computer and verify that the requirementsof the written security policy are met.  What should you do?()AOpen the Default Domain Policy and enable the Configure Automatic Updates policy.BOpen the Default Domain Policy and enable the Audit object access policy, the Audit account management policy, and the Audit system events policy.COn a server, install and run mbsacli.exe with the appropriate configuration switches.DOn a server, install and run HFNetChk.exe with the appropriate configuration switches.

单选题Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()AIn the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.BIn the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.CIn the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.DIn the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.

多选题You installed Oracle Database 11g afresh. Which statements are true regarding the default audit settings in this database?()AThe audit trail is stored in an operating system file.BAuditing is disabled for all privileges.CThe audit trail is stored in the database.DAuditing is enabled for all privileges.EAuditing is enabled for certain privileges related to database security.

单选题You issue the following RMAN command to set a retention policy on a database: RMANCONFIGURE RETENTION POLICY TO REDUNDANCY 2; What will be the outcome of issuing this command?()AAfter two days, a backup will be marked obsoleteBAfter two days, a backup will be deleted from the mediaCIf the RMAN repository has records of two or more recent backups of a file, then older backups will be deleted from the media.DIf the RMAN repository has records of two or more recent backups of a file, then older backups will be marked obsolete.

多选题You execute the following PL/SQL:Which two statements are true?()AFine-Grained Auditing (FGA) is enabled for the PRICE column in the PRODUCTS table for SELECT statements only when a row with PRICE 10000 is accessed.BFGA is enabled for the PRODUCTS.PRICE column and an audit record is written whenever a row with PRICE 10000 is accessed.CFGA is enabled for all DML operations by JIM on the PRODUCTS.PRICE column.DFGA is enabled for the PRICE column of the PRODUCTS table and the SQL statements is captured in the FGA audit trial.

单选题Your network contains an Active Directory domain. All servers run Windows Server 2008 R2.     You need to audit the deletion of registry keys on each server.     What should you do()AFrom Audit Policy, modify the Object Access settings and the Process Tracking settings.BFrom Audit Policy, modify the System Events settings and the Privilege Use settings.CFrom Advanced Audit Policy Configuration, modify the System settings and the Detailed Tracking settings.DFrom Advanced Audit Policy Configuration, modify the Object Access settings and the Global Object Access Auditin

单选题Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()A Configure a directory service access audit policy. Increase the maximum size of the security log.B Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C Configure an object access audit policy for the directory. Increase the maximum size of the system log.D Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

单选题You have a computer that runs Windows 7. You need to record when an incoming connection is allowedthrough Windows firewall. What should you do?()AIn Local Group Policy, modify the audit policy.BIn Local Group Policy, modify the system audit policy.CFrom the Windows Firewall with Advanced Security properties, set the logging settings to Log successfulconnections.DFrom the Windows Firewall with Advanced Security properties, set the Data Protection (Quick Mode)IPSec settings to Advanced.