单选题ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()A It is a list of remote database links stored in the XML file that are available to the users of the database.B It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.C It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.D It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

单选题
ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()
A

 It is a list of remote database links stored in the XML file that are available to the users of the database.

B

 It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.

C

 It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.

D

 It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.


参考解析

解析: 暂无解析

相关考题:

You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?() A. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.B. Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.C. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.D. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.

When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?() A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS serverB. Configure the supplicant as anexternal authentication serverC. Configure RADIUS proxy on the realmD. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?() A. Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.B. Configure a security policy that references the unified-access-control captive-portal service.C. Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.D. Configure a security policy that references the unified-access-control intranet-controller service.

You configure a Group Policy Object for the Marketing organizational unit (OU) to prevent users from accessing My Network Places and from running System in Control Panel. You want the Managers domain local group to be able to access My Network Places, but you still want to prevent them from running System in Control Panel.What should you do?A.Add the managers group to the access control list of the GPO. Disable the permission of the managers group to read and apply the group policy.B.Add the managers group to the access control list of the GPO. Deny the permission of the managers group to read and apply the group policy.C.Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to apply the group policy. Deny the authenticated users group permission to read and apply group policy. Configure the new GPO to deny the ability to run System in Control Panel. Give the original GPO a higher priority than the new GPO.D.Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to read and apply the group policy. Disable the permission of the authenticated user group to read and apply the group policy. Configure the new GPO to allow access to My Network Places. Give the new GPO a higher priority than the original GPO.

You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The domain contains a group named SalesAdmin. Members of the SalesAdmin group need the permission to add Group Policy links and create Group Policy objects (GPOs) for only the Sales organizational unit (OU). You need to configure the domain to provide the SalesAdmin group with the minimum permissions necessary to meet these requirements. What should you do?()A、Add the SalesAdmins group to the Group Policy Creator Owners group.B、Configure the discretionary access control list (DACL) on all of the Group Policy links for the Sales OU to assign the SalesAdmins group the Allow - Apply Group Policy permission.C、Run the Delegation of Control wizard on the domain to assign the SalesAdmin group the Manage Group Policy links task.D、Run the Delegation of Control wizard on the Sales OU to assign the SalesAdmins group the Manage Group Policy links task.

When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()A、Configure IP helper to forward the authentication requests from the clients to the external RADIUS serverB、Configure the supplicant as anexternal authentication serverC、Configure RADIUS proxy on the realmD、Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

Your network contains an Active Directory forest. The forest contains a single domain. You want  to access resources in a domain that is located in another forest.     You need to configure a trust between the domain in your forest and the domain in the other  forest.     What should you create()A、an incoming external trustB、an incoming realm trustC、an outgoing external trustD、an outgoing realm trust

You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C、Create and configure a new security template. Import the template into the local policy on VPN2D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

You need to configure the DNS resource records for incoming e-mail messages from the Internet. What should you do?()A、Configure mailbox (MB) resource records in the external DNS domain. Configure each record so that it has the same refresh intervalB、Configure mailbox (MB) resource records in the external DNS domain. Configure each record so that it has the same default Time to Live (TTL) intervalC、Configure mail exchanger (MX) resource records in the external DNS domain. Configure each record to have the same preference and a different mail exchangerD、Configure mail exchanger (MX) resource records in the external DNS domain. Configure each record to have the same preference and the same mail exchanger

You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()A、Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settingsB、On all computers in the domain, configure the Local Security Policy7 with the required account policy settingsC、Configure the Default Domain Policy GPO with the required account policy settingsD、Configure the Default Domain Controllers Policy GPO with the required account policy settings

Your network consists of a single Active Directory domain. The relevant portion of the Active Directory domain is configured as shown in the following diagram. The Staff organizational unit (OU) contains all user accounts except for the managers user accounts. The Managers OU contains the managers user accounts and the following global groups    èSales èFinance èEngineering   You create a new Group Policy object (GPO) named GPO1, and then link it to the Employees OU. Users from the Engineering global group report that they are unable to access the Run commandon the Start menu. You discover that the GPO1 settings are causing the issue.   You need to ensure that the users from the Engineering global group are able to access the Run  command on the Start menu. What should you do?()A、Configure GPO1 to use the Enforce Policy option.B、Configure Block Inheritance on the Managers OU.C、Configure Group Policy filtering on GPO1 for the Engineering global group.D、Create a new child OU named Engineering under the Employees OU. Move the Engineering global group to the new Engineering child OU.

You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A、Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB、Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

You implement Parental Controls game restrictions for your child on your computer. You select the TEEN rating game restriction.  Your child is still able to run some inappropriate games.  You need to prevent access to all inappropriate games.  What should you do? ()A、Configure the Game Restrictions parental control to disallow games that are not rated.B、Configure the Game Restrictions parental control to block games that have intense violence. C、Configure Windows Defender to remove high alert items.D、Configure Microsoft Internet Explorer in Protected Mode.

You need to design a domain model that meets the company business and security requirements for controlling access to the new Web-based ordering application. What should you do?()A、Create a child OU within the existing domainB、Create a child domain of the existing domainC、Create a new domain in a new forest. Configure the new domain to trust the existing domainD、Create a new tree in the existing forest. Configure the new domain to trust the existing domain

ou have a server that runs Windows Server 2003 Service Pack 2 (SP2). Routing and Remote Access is enabled and the server is configured as a remote access server.You need to configure the server to support only the MS-CHAP v2 authentication protocol for remote access authentication.What should you do from the Routing and Remote Access snap-in?()A、Configure the port properties. B、Create and configure a new demand-dial interface. C、From the server’s properties, modify the security options. D、From the Connections to Microsoft Routing and Remote Access Server policy, add a new condition.

You are the network administrator for your company. The network consists of a single Active Directory domain. The domain includes an organizational unit (OU) named Processing. There are 100 computer accounts in the Processing OU. You create a Group Policy object (GPO) named NetworkSecurity and link it to the domain. You configure NetworkSecurity to enable security settings through the Computer Configuration section of the Group Policy settings. You need to ensure that NetworkSecurity will apply only to the computers in the Processing OU. You need to minimize the number of GPO links.  What should you do?()A、 Link NetworkSecurity to the Processing OU. Disable the User Configuration section of NetworkSecurity.B、 Link NetworkSecurity to the Processing OU. Remove the link from NetworkSecurity to the domain.C、 Modify the discretionary access control list (DACL) for NetworkSecurity to assign all computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.D、 Modify the discretionary access control list (DACL) for NetworkSecurity to assign the Authenticated Users group the Deny - Apply Group Policy permission and to assign all of the computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.

单选题You need to design a security strategy for a remote e-mail access. What should you do?()ARequire remote users to access e-mails by using Outlook Mobile AccessBRequire Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesCOn Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsDOn Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

单选题You are the network administrator for your company. Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. You add eight servers for a new application. You create an organizational unit (OU) named Application to hold the servers and other resources for the application. Users and groups in the domain will need varied permissions on the application servers. The members of a global group named Server Access Team need to be able to grant access to the servers. The Server Access Team group does not need to be able to perform any other tasks on the servers. You need to allow the Server Access Team group to grant permissions for the application servers without granting the Server Access Team group unnecessary permissions.  What should you do?()A Create a Group Policy object (GPO) for restricted groups. Configure the GPO to make the Server Access Team group a member of the Power Users group on each application server. Link the GPO to the Application OU.B Grant the Server Access Team group permissions to modify computer objects in the Application OU.C Move the Server Access Team group object into the Application OU.D Create domain local groups that grant access to the application servers. Grant the Server Access Team group permissions to modify the membership of the domain local groups.

单选题Your network contains an Active Directory forest. The forest contains a single domain. You want  to access resources in a domain that is located in another forest.     You need to configure a trust between the domain in your forest and the domain in the other  forest.     What should you create()Aan incoming external trustBan incoming realm trustCan outgoing external trustDan outgoing realm trust

单选题ou have a server that runs Windows Server 2003 Service Pack 2 (SP2). Routing and Remote Access is enabled and the server is configured as a remote access server.You need to configure the server to support only the MS-CHAP v2 authentication protocol for remote access authentication.What should you do from the Routing and Remote Access snap-in?()AConfigure the port properties. BCreate and configure a new demand-dial interface. CFrom the server’s properties, modify the security options. DFrom the Connections to Microsoft Routing and Remote Access Server policy, add a new condition.

单选题You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()ACreate the role with external authentication.BCreate the role as a secure application role.CCreate the role as a password-protected role.DCreate a role and use Fine-Grained Access Control (FGAC) to secure the role

单选题You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()AIt is a list of remote database links stored in the XML file that are available to the users of the database.BIt is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.CIt is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.DIt is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

单选题You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. The domain contains a group named SalesAdmin. Members of the SalesAdmin group need the permission to add Group Policy links and create Group Policy objects (GPOs) for only the Sales organizational unit (OU). You need to configure the domain to provide the SalesAdmin group with the minimum permissions necessary to meet these requirements. What should you do?()AAdd the SalesAdmins group to the Group Policy Creator Owners group.BConfigure the discretionary access control list (DACL) on all of the Group Policy links for the Sales OU to assign the SalesAdmins group the Allow - Apply Group Policy permission.CRun the Delegation of Control wizard on the domain to assign the SalesAdmin group the Manage Group Policy links task.DRun the Delegation of Control wizard on the Sales OU to assign the SalesAdmins group the Manage Group Policy links task.

单选题When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()AConfigure IP helper to forward the authentication requests from the clients to the external RADIUS serverBConfigure the supplicant as anexternal authentication serverCConfigure RADIUS proxy on the realmDSpecify the correct RADIUS port 389 on the Junos Pulse Access Control Service

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain includes an organizational unit (OU) named Processing. There are 100 computer accounts in the Processing OU. You create a Group Policy object (GPO) named NetworkSecurity and link it to the domain. You configure NetworkSecurity to enable security settings through the Computer Configuration section of the Group Policy settings. You need to ensure that NetworkSecurity will apply only to the computers in the Processing OU. You need to minimize the number of GPO links.  What should you do?()A Link NetworkSecurity to the Processing OU. Disable the User Configuration section of NetworkSecurity.B Link NetworkSecurity to the Processing OU. Remove the link from NetworkSecurity to the domain.C Modify the discretionary access control list (DACL) for NetworkSecurity to assign all computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.D Modify the discretionary access control list (DACL) for NetworkSecurity to assign the Authenticated Users group the Deny - Apply Group Policy permission and to assign all of the computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.

多选题You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()AEnable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)BEnable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web siteCEnable SSL on the external Web site by using a commercial digital certificateDEnable SSL on the intranet Web site by using an internal server certificateEEnable SSL on the external Web site by using an internal server certificate

单选题You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()AConfigure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesBConfigure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useCCreate a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksDCreate a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks