单选题Which of the following options enables a user to get authenticated though a single password instead of using multiple passwords?()AWallet ManagerBRadiusCOracle Internet DirectoryDNone of the above

单选题
Which of the following options enables a user to get authenticated though a single password instead of using multiple passwords?()
A

Wallet Manager

B

Radius

C

Oracle Internet Directory

D

None of the above


参考解析

解析: 暂无解析

相关考题:

Which of the following can be tracked using the WBS?A.timeB.costC.performanceD.scopeE.None of the above.

60 Which of the following can be tracked using the WBS?A. timeB. costC. performanceD. scopeE. None of the above

● Which of the following can be tracked using the WBS?A timeB costC performanceD scopeE None of the above.

Which of the following statements about ORACLE is (are) correct?Ⅰ.ORACLE follows SQL standardⅡ.ORACLE database defines two logical types: table and viewA.ⅠonlyB.Ⅱ onlyC.Ⅰ and ⅡD.none of the above

Examine the following RMAN command:RMAN CONFIGURE ENCRYPTION FOR DATABASE ON;RMAN BACKUP DATABASE PLUS ARCHIVELOG;Which prerequisite must be met before accomplishing the backup?() A. Provide a password for the encryptionB. Set up an Oracle wallet for the encryptionC. No setup is required as it is a default encryption methodD. Both Oracle wallet and password must be set up for the encryption

In your database, the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:Which authentication method would be used first?()A. authentication by password fileB. authentication by using certificates over SSLC. authentication by using the Oracle Internet DirectoryD. authentication by using the local OS of the database server

Which one of the following varieties of NAT utilizes different ports to map multiple IP addresses to a single globally registered IP address?() A. Static NATB. Port loadingC. NAT OverloadingD. Dynamic NATE. None of the above

Which one of the following varieties of NAT utilizes different ports to map multiple IP addresses to a single globally registered IP address?()A、Static NATB、Port loadingC、NAT OverloadingD、Dynamic NATE、None of the above

Which of the following is NOT a security feature relating to user accounts?()A、Some commands can be password protected requiring logged in customers to re-enter their password.B、A user account can be disabled automatically, after a specified number of invalid login attempts.C、An account can have multiple valid passwords at the same time, any of which can be used to access the account.D、The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.E、Logged in customers can be logged off of the system after a specified period of inactivity.

The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()A、The user would not be able to log in to the wallet.B、The user is able to log in with their wallet password, but the wallet is not synchronized with the server.C、A user must be re-assigned to another policy template in order to change any aspects of the applied policy.D、The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

Which user authenticaton method is supported by the Junos OS as the last resort alternative?()A、TACACS+B、RADIUSC、local user databaseD、enable password

Which of the following options would you choose to implement controlled access using remote authentication for your networks?()A、OiDB、RADIUSC、Wallet ManagerD、Oracle Names Server

Examine the following RMAN command:RMAN CONFIGURE ENCRYPTION FOR DATABASE ON;RMAN BACKUP DATABASE PLUS ARCHIVELOG;Which prerequisite must be met before accomplishing the backup?()A、Provide a password for the encryptionB、Set up an Oracle wallet for the encryptionC、No setup is required as it is a default encryption methodD、Both Oracle wallet and password must be set up for the encryption

Which of the following options enables a user to get authenticated though a single password instead of using multiple passwords?()A、Wallet ManagerB、RadiusC、Oracle Internet DirectoryD、None of the above

In your database,the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:$ SQLPLUS scott/tiger@DB01 AS SYSDBA   where DB01 is the net service name.   Which authentication method would be used first?()  A、 authentication by password fileB、 authentication by using certificates over SSLC、 authentication by using the Oracle Internet DirectoryD、 authentication by using the local OS of the database server

Identify four uses of the Oracle Scheduler.()A、 enables Oracle database to schedule which processes execute on which processors in a multiple CPU environmentB、 enables Oracle database to do patches according to a DBA-defined scheduleC、 enables you to schedule the execution of jobs based on timeD、 enables you to execute jobs in a clustered environmentE、 enables you to periodically execute operating systemscript files located on the same server as the databaseF、 enables you to create a job that makes use of saved programs and schedulesG、 enables you to automate the management of the jobs that are created using the DBMS_JOB package

Which of the following options describes Segment Shrink?()  A、 Reclaims space above and below the high-water mark without using additional spaceB、 Moves rows to a new physical location,resetting the high-water mark,but uses additional space during the operationC、 Deallocates space above the high-water mark that is currently not in useD、 None of the above

In Oracle 11g,by default which one of the following conditions implicitly enables Automatic PGA Memory Management?()  A、 Setting a nonzero value for SGA_TARGETB、 Configuring Automatic Shared Memory ManagementC、 Configuring Automatic Memory ManagementD、 Setting a nonzero value for SGA_MAX_SIZE and PGA_AGGREGATE_TARGETE、 None of the above

单选题You are the desktop administrator for Contoso, Ltd. Philippe is a user in the accounting department. Philippe reports that he is not able to download a file from an FTP server by using Internet Explorer on his Windows XP Professional computer. When Philippe attempts to access the FTP server by using the URL ftp://ftp.contoso.com, Internet Explorer displays the following error message: "The password was rejected." Philippe informs you that he has a user name and password for the FTP server, but that Internet Explorer does not prompt him to type the user name or password. You need to ensure that Philippe can access the FTP server by using Internet Explorer on his computer. Which URL should you instruct Philippe to use?()Aftp://ftp.contoso.com/Philippe Bftp://Philippe:password@ftp.contoso.comCftp://Philippe/ftp.contoso.com Dftp://ftp.contoso.com@Philippe:password

单选题In Oracle 11g,by default which one of the following conditions implicitly enables Automatic PGA Memory Management?()A Setting a nonzero value for SGA_TARGETB Configuring Automatic Shared Memory ManagementC Configuring Automatic Memory ManagementD Setting a nonzero value for SGA_MAX_SIZE and PGA_AGGREGATE_TARGETE None of the above

单选题Which of the following is NOT a security feature relating to user accounts?()ASome commands can be password protected requiring logged in customers to re-enter their password.BA user account can be disabled automatically, after a specified number of invalid login attempts.CAn account can have multiple valid passwords at the same time, any of which can be used to access the account.DThe password policy feature can allow the system to require passwords to include a minimum number of numeric characters.ELogged in customers can be logged off of the system after a specified period of inactivity.

单选题In your database,the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:$ SQLPLUS scott/tiger@DB01 AS SYSDBA   where DB01 is the net service name.   Which authentication method would be used first?()A authentication by password fileB authentication by using certificates over SSLC authentication by using the Oracle Internet DirectoryD authentication by using the local OS of the database server

单选题Which of the following options enables a user to get authenticated though a single password instead of using multiple passwords?()AWallet ManagerBRadiusCOracle Internet DirectoryDNone of the above

单选题You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()ARun ipconfig /flushdns at the command prompt. BReset the password for the local administrator user account. CFrom the Internet Options in Internet Explorer, clear the AutoComplete history.DFrom the Internet Options in Internet Explorer, delete the Temporary Internet Files.

单选题Which of the following options describes Segment Shrink?()A Reclaims space above and below the high-water mark without using additional spaceB Moves rows to a new physical location,resetting the high-water mark,but uses additional space during the operationC Deallocates space above the high-water mark that is currently not in useD None of the above

单选题The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()AThe user would not be able to log in to the wallet.BThe user is able to log in with their wallet password, but the wallet is not synchronized with the server.CA user must be re-assigned to another policy template in order to change any aspects of the applied policy.DThe user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

单选题Examine the following RMAN command:RMAN CONFIGURE ENCRYPTION FOR DATABASE ON;RMAN BACKUP DATABASE PLUS ARCHIVELOG;Which prerequisite must be met before accomplishing the backup?()AProvide a password for the encryptionBSet up an Oracle wallet for the encryptionCNo setup is required as it is a default encryption methodDBoth Oracle wallet and password must be set up for the encryption

单选题Examine the following RMAN command:   RMAN CONFIGURE ENCRYPTION FOR DATABASE ON; RMAN BACKUP DATABASE PLUS ARCHIVELOG;   Which prerequisite must be met before accomplishing the backup?()A Provide a password for the encryptionB Set up an Oracle wallet for the encryptionC No setup is required as it is a default encryption methodD Both Oracle wallet and password must be set up for the encryption