单选题To determine whether a particular file has a virus by only inspecting a few initial packets before receiving the entire file, which UTM feature do you enable?()AURL white listsBintelligent pre-screeningCtricklingDscan mode extensions

单选题
To determine whether a particular file has a virus by only inspecting a few initial packets before receiving the entire file, which UTM feature do you enable?()
A

URL white lists

B

intelligent pre-screening

C

trickling

D

scan mode extensions


参考解析

解析: 暂无解析

相关考题:

You have enabled backup optimization for the RMAN environment.Identify two criteria on which RMAN will skip the file, if it has already been backed up.() A. The data file backup is done with multiple channelsB. The data files is in the read-write mode after being backed up in the read only modeC. The backup was taken after the data files was taken offline-normal or is in the read only modeD. The data file backup complies with the back retention policy and the backup duplexing feature

You have not configured Oracle Managed Files (OMF) in your database. You do not want to scan the entire datafile every time an incremental backup is performed. You decide to enable the block change tracking feature. Which statement should you use to enable the block change tracking feature?()A. ALTER DATABASE ENABLE BLOCK CHANGE TRACKING;B. ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING USING FILE path;C. ALTER DATABASE ENABLE BLOCK CHANGE TRACKING USING FILE path;D. ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING;

You have enabled backup optimization for the RMAN environment. Identify two criteria on which RMAN will skip the file, if it has already been backed up.() (Choose two.) A. The data file backup is done with multiple channelsB. The data files is in the read-write mode after being backed up in the read only modeC. The backup was taken after the data files was taken offline-normal or is in the read only modeD. The data file backup complies with the back retention policy and the backup duplexing feature

To determine whether a particular file has a virus by only inspecting a few initial packets before receiving the entire file, which UTM feature do you enable?() A. URL white listsB. intelligent pre-screeningC. tricklingD. scan mode extensions

Which command do you use to display the status of an antivirus database update?() A. show security utm anti-virus statusB. show security anti-virus database statusC. show security utm anti-virus databaseD. show security utm anti-virus update

Certkiller .com has asked you to create a file management application to monitor the hosts file.Certkiller .com has instructed you to change the hosts file if it has been changed.You, therefore, need to display the size and whether the hosts file is set to read-only.What should you do?()A.B.C.D.

You created a custom menu for the Order Entry application. Which step do you perform before attaching the menu module to the form module?()A、Select file--Administration--Convert B、Select file--Administration--Execute C、Select file--Administration--Compile FileD、No further step is necessary.

You have enabled backup optimization for the RMAN environment.Identify two criteria on which RMAN will skip the file, if it has already been backed up.()A、The data file backup is done with multiple channelsB、The data files is in the read-write mode after being backed up in the read only modeC、The backup was taken after the data files was taken offline-normal or is in the read only modeD、The data file backup complies with the back retention policy and the backup duplexing feature

Which command do you use to display the status of an antivirus database update?()A、show security utm anti-virus statusB、show security anti-virus database statusC、show security utm anti-virus databaseD、show security utm anti-virus update

To determine whether a particular file has a virus by only inspecting a few initial packets before receiving the entire file, which UTM feature do you enable?()A、URL white listsB、intelligent pre-screeningC、tricklingD、scan mode extensions

You have not configured Oracle Managed Files (OMF) in your database. You do not want to scan the entire datafile every time an incremental backup is performed. You decide to enable the block change tracking feature. Which statement will you use to enable the block change tracking feature?()A、 ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING;B、 ALTER DATABASE ENABLE BLOCK CHANGE TRACKING;C、 ALTER SYSTEM ENABLE BLOCK CHANGE TRACKING USING FILE ;D、 ALTER DATABASE ENABLE BLOCK CHANGE TRACKING USING FILE ;

In which case would you use the Flashback Database feature to perform a recovery?()A、to recover a dropped tablespaceB、to recover data from a truncated tableC、to recover a data file that has been shrunkD、to recover a database to the state that existed before the RESETLOGS operation

You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database.  Which method would you use to recover the data file?()A、Restore all the data files and open the databaseB、Create the data file and performtablespacerecoveryC、No need to restore any file, just recover the databaseD、Restore only the system data file and recover the databaseE、Restore only lost date file and performtablespacerecovery

You have enabled backup optimization for the RMAN environment. Identify two criteria on which RMAN will skip the file, if it has already been backed up.()A、 The data file backup is done with multiple channelsB、 The data files is in the read-write mode after being backed up in the read only modeC、 The backup was taken after the data files was taken offline-normal or is in the read only modeD、 The data file backup complies with the back retention policy and the backup duplexing fe ture

Your company has file servers located in an organizational unit named Payroll. The file servers  contain payroll files located in a folder named Payroll.     You create a GPO. You need to track which employees access the Payroll files on the file  servers.   What should you do()    A、Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file servers, configureB、Enable the Audit object access option. Link the GPO to the domain. On the domain controllers, configure Auditing fC、Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit. On the file seD、Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file servers, config

Your portable computer has two 512-MB memory modules installed in the only two memory slots available.  You need to improve the speed of your computer.  What should you do? ()A、Adjust the processor scheduling to optimize for background services.B、Connect a USB flash drive to the computer. Enable the ReadyBoost feature.C、Configure the virtual memory file to exist on the same drive as the operating system.D、Configure the local security policy setting of the computer to clear the virtual page file upon shutdown.

You are the network administrator for Company.com.  Your Windows 2000 Professional computer has 128 MB of RAM and two physical hard disks. Each hard disk has a single partition configured as drive C and D. Each partition has more than 500 MB of free disk space. Windows 2000 Professional and all applications are installed on drive C. You frequently run two or more memory-intensive graphics applications simultaneously. You notice that access to drive C is much slower when you are using the graphics applications. You want to maximize overall disk performance for your computer.   What should you do?()A、Configure the paging file to reside on drive C onlyB、Configure the paging file to reside on drive D onlyC、Configure the initial size of the paging file and the maximum size of paging file to 64 MBD、Configure the initial size of the paging file and the maximum size of the paging file to 128 MBE、Configure the initial size of the paging file and the maximum size of the paging file to 256 MB

You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. contains a shared folder named TestKingProjects. You use the Backup utility once each day to back up the TestKingProjects folder. You discover that a database file in the TestKingProjects folder is corrupt. You confirm that the file corruption is not the result of a virus. You need to replace the corrupted file by using the latest backup. You do not know whether the file was corrupted before or after the latest backup was completed. You need to verify that the file in the backup can be opened successfully before you overwrite the existing file. What should you do?()A、In the Backup utility, select the Verify data after backup option.B、Run the Ntbackup //TestKing2/TestKingProjects /v:yes command.C、Restore the file to a temporary folder. Verify that the database file contains the correct data. Copy the restored file to the TestKingProjects folder.D、Restore the file to a temporary folder. Use the Windiff utility to compare the file in the temporary folder to the file in the TestKingProjects folder. Copy the restored file to the TestKingProjects folder.

单选题You have not configured Oracle Managed Files (OMF) in your database. You do not want to scan the entire datafile every time an incremental backup is performed. You decide to enable the block change tracking feature. Which statement should you use to enable the block change tracking feature?()AALTER DATABASE ENABLE BLOCK CHANGE TRACKING;BALTER SYSTEM ENABLE BLOCK CHANGE TRACKING USING FILE path;CALTER DATABASE ENABLE BLOCK CHANGE TRACKING USING FILE path;DALTER SYSTEM ENABLE BLOCK CHANGE TRACKING;

单选题You have not configured Oracle Managed Files (OMF) in your database. You do not want to scan the entire datafile every time an incremental backup is performed. You decide to enable the block change tracking feature.Which statement should you use to enable the block change tracking feature?()AALTER DATABASE ENABLE BLOCK CHANGE TRACKINGBALTER SYSTEM ENABLE BLOCK CHANGE TRACKING USING FILE CALTER DATABASE ENABLE BLOCK CHANGE TRACKING USING FILE DALTER SYSTEM ENABLE BLOCK CHANGE TRACKING

单选题You work as a database administrator for Supportcenter.cn. Your database is in NOARCHIVELOG mode. The database has been configured with three redo logs groups, and there have been five log switches. You lost one non-system-critical data file from your database. Which method would you use to recover the data file?()ARestore all the data files and open the databaseBCreate the data file and perform tablespace recoveryCNo need to restore any file, just recover the databaseDRestore only the system data file and recover the databaseERestore only lost date file and performtablespacerecovery

多选题You are the network administrator for Company.com.  Your Windows 2000 Professional computer has 128 MB of RAM and two physical hard disks. Each hard disk has a single partition configured as drive C and D. Each partition has more than 500 MB of free disk space. Windows 2000 Professional and all applications are installed on drive C. You frequently run two or more memory-intensive graphics applications simultaneously. You notice that access to drive C is much slower when you are using the graphics applications. You want to maximize overall disk performance for your computer.   What should you do?()AConfigure the paging file to reside on drive C onlyBConfigure the paging file to reside on drive D onlyCConfigure the initial size of the paging file and the maximum size of paging file to 64 MBDConfigure the initial size of the paging file and the maximum size of the paging file to 128 MBEConfigure the initial size of the paging file and the maximum size of the paging file to 256 MB

单选题Your portable computer has two 512-MB memory modules installed in the only two memory slots available.  You need to improve the speed of your computer.  What should you do? ()AAdjust the processor scheduling to optimize for background services.BConnect a USB flash drive to the computer. Enable the ReadyBoost feature.CConfigure the virtual memory file to exist on the same drive as the operating system.DConfigure the local security policy setting of the computer to clear the virtual page file upon shutdown.

单选题Which command do you use to display the status of an antivirus database update?()Ashow security utm anti-virus statusBshow security anti-virus database statusCshow security utm anti-virus databaseDshow security utm anti-virus update

单选题In which case would you use the Flashback Database feature to perform a recovery?()Ato recover a dropped tablespaceBto recover data from a truncated tableCto recover a data file that has been shrunkDto recover a database to the state that existed before the RESETLOGS operation

单选题To determine whether a particular file has a virus by only inspecting a few initial packets before receiving the entire file, which UTM feature do you enable?()AURL white listsBintelligent pre-screeningCtricklingDscan mode extensions

单选题You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. contains a shared folder named TestKingProjects. You use the Backup utility once each day to back up the TestKingProjects folder. You discover that a database file in the TestKingProjects folder is corrupt. You confirm that the file corruption is not the result of a virus. You need to replace the corrupted file by using the latest backup. You do not know whether the file was corrupted before or after the latest backup was completed. You need to verify that the file in the backup can be opened successfully before you overwrite the existing file. What should you do?()AIn the Backup utility, select the Verify data after backup option.BRun the Ntbackup //TestKing2/TestKingProjects /v:yes command.CRestore the file to a temporary folder. Verify that the database file contains the correct data. Copy the restored file to the TestKingProjects folder.DRestore the file to a temporary folder. Use the Windiff utility to compare the file in the temporary folder to the file in the TestKingProjects folder. Copy the restored file to the TestKingProjects folder.

单选题You created a custom menu for the Order Entry application. Which step do you perform before attaching the menu module to the form module?()ASelect file--Administration--Convert BSelect file--Administration--Execute CSelect file--Administration--Compile FileDNo further step is necessary.