单选题You previously secured your listener with an encrypted password. However, you need to set a new password for security reasons. What is the correct method for setting a new encrypted password for the listener using the Listener Control utility?()A executing the SET PASSWORD command and then the SAVE_CONFIG commandB executing the CHANGE_PASSWORD command and then the SAVE_CONFIG commandC executing the CHANGE_PASSWORD command and then the SET PASSWORD commandD executing the SET PASSWORD command, then the CHANGE_PASSWORD command and finally, the SAVE_CONFIG command

单选题
You previously secured your listener with an encrypted password. However, you need to set a new password for security reasons. What is the correct method for setting a new encrypted password for the listener using the Listener Control utility?()
A

 executing the SET PASSWORD command and then the SAVE_CONFIG command

B

 executing the CHANGE_PASSWORD command and then the SAVE_CONFIG command

C

 executing the CHANGE_PASSWORD command and then the SET PASSWORD command

D

 executing the SET PASSWORD command, then the CHANGE_PASSWORD command and finally, the  SAVE_CONFIG command


参考解析

解析: 暂无解析

相关考题:

When it comes to placing an interest hook in your elevator pitch and making it more contagious, you should speak proudly about your story as the listener is experiencing it.()

We would suggest that you()the carton with double straps. A、will secureB、securingC、secureD、are secured

Your database instance is running.You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.Which tool or utility would you use to start the listener?() A. Oracle Net ManagerB. Listener Control utilityC. Database Configuration AssistantD. Oracle Net Configuration Assistant

Your database is open and the LISTENER listener running. You stopped the wrong listener LISTENER byissuing the following command:lsnrctl >STOPWhat happens to the sessions that are presently connected to the database Instance?()A. They are able to perform only queries.B. They are not affected and continue to function normally.C. They are terminated and the active transactions are rolled back.D. They are not allowed to perform any operations until the listener LISTENER is started

You work as a database administrator for Supportcenter.cn. When you tried to connect to the database, you received the following error:   ERROR:   ORA-12541:TNS:no_listener   You found that the listener is not running on the server, so you issued the following command in the Listener Control utility to start the listener.   lsnrctlSTART   What statement is true?()A、It would attempt to start the default listenerB、It would start the most recently created listener.C、It would display an error with a message asking for the listener name to be specified.D、It would show you a list of listeners and prompts for the listener name that you want to start.

You were recently hired by Certkiller .com as a database administrator. You are asked to find out whether the currently functional listener process, named L1, has been password protected or not. You are not familiar with the file system of the new organization. How would you accomplish the task?()A、 by using the STATUS command of the Listener control utilityB、 by using the STATUS L1 command of the Listener control utilityC、 by using the SHOW RULES command of the Listener control utilityD、 by using the SET PASSWORD command of the Listener control utilityE、 by searching for the PASSWORD_LISTENER entry in the listener.ora file

You are configuring the listener on your server. Which listener.ora parameter contains the information needed to detect session requests from different client types?()A、ADDRESS_LISTB、SID_NAMEC、LISTENERD、SERVICE_LIST

You want your listener to be password protected to prevent it from being shut down. You want to accomplish this task while the listener is functional. Which method could you use to achieve this objective?()A、 Use the CHANGE_PASSWORD command of the Listener control utility.B、 Use the SET PASSWORD and SAVE_CONFIG commands of the Listener control utility.C、 Use the CHANGE_PASSWORD and SAVE_CONFIG commands of the Listener control utility.D、 Manually modify the listener.ora file to include the password for the listener and restart the listener.

Your database instance is running. You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.  Which tool or utility would you use to start the listener?()A、 Oracle Net ManagerB、 Listener Control utilityC、 Database Configuration AssistantD、 Oracle Net Configuration Assistant

You previously secured your listener with an encrypted password. However, you need to set a new password for security reasons. What is the correct method for setting a new encrypted password for the listener using the Listener Control utility?()A、 executing the SET PASSWORD command and then the SAVE_CONFIG commandB、 executing the CHANGE_PASSWORD command and then the SAVE_CONFIG commandC、 executing the CHANGE_PASSWORD command and then the SET PASSWORD commandD、 executing the SET PASSWORD command, then the CHANGE_PASSWORD command and finally, the SAVE_CONFIG command

As the administrator of your company’s network, you have implemented encryption for extra security of data on your network. A user moves an encrypted file from an NTFS partition on her Windows 2000 Workstation to an NTFS folder on a remote Windows 2000 Server. What effect will this have on the encrypted file?()A、The encrypted file will automatically be decrypted.B、Encrypted files and folders cannot be moved or copied, decrypt it first then move or copy thefile or folder.C、The encrypted file will remain encrypted in the Windows 2000 folder.D、The encrypted file will inherit the encryption state of the remote NTFS folder.

You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()A、Move the encrypted data to a folder on ATLFP2 over an IPSec connectionB、Move the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connectionC、Move the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2D、Move the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL

单选题You want your listener to be password protected to prevent it from being shut down. You want to accomplish this task while the listener is functional. Which method could you use to achieve this objective?()A Use the CHANGE_PASSWORD command of the Listener control utility.B Use the SET PASSWORD and SAVE_CONFIG commands of the Listener control utility.C Use the CHANGE_PASSWORD and SAVE_CONFIG commands of the Listener control utility.D Manually modify the listener.ora file to include the password for the listener and restart the listener.

单选题You work as a database administrator for Certkiller .com. When you tried to connect to the database, you received the following error: ERROR:  ORA-12541:TNS:no_listener  You found that the listener is not running on the server, so you issued the following command in the Listener Control utility to start the listener.  lsnrctlSTART  What statement is true?()AIt would attempt to start the default listenerBIt would start the most recently created listener.CIt would display an error with a message asking for the listener name to be specified.DIt would show you a list of listeners and prompts for the listener name that you want to start.

单选题You have two listener processes, named L1 and L2. Both the listener processes are currently functional. While viewing the listener.ora file on your database server, you find the following entry: PASSWORDS_L1 = (1sanfrjp43) What would be the impact of this setting?()AThe listener process named L1 will disconnect the unauthorized users.BThe listener process named L1 will be prevented from being started by unauthorized users. CThe listener process named L1 will be prevented from being stopped by unauthorized users. DThe listener process named L1 will be prevented from being reloaded by unauthorized users.EThe listener process named L1 will be prevented from accepting connections from unauthorized users.

单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()AEncrypt customer information when it is stored and when it is being transmittedBRequire encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkCEncrypt all marketing information on file servers and client computersDRequire encrypted connections to all file servers

单选题You work as a database administrator for Certkiller .com. You enabled tracing while creating a listener to your database.  What additional information is available to you when you enable tracing?()AInformation about each Oracle Net connection.BInformation about each entry in theLinstener.orafileCInformation about the changed done in the databaseDInformation about the different listeners in your systemEInformation about all thenondatabasefiles required to operate the database

单选题Your database instance is running. You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.  Which tool or utility would you use to start the listener?()A Oracle Net ManagerB Listener Control utilityC Database Configuration AssistantD Oracle Net Configuration Assistant

单选题Your database instance is running.You are not able to access Oracle Enterprise Manager Database Control because the listener is not started.Which tool or utility would you use to start the listener?()AOracle Net ManagerBListener Control utilityCDatabase Configuration AssistantDOracle Net Configuration Assistant

单选题You()to feedback from your listener.AadaptBadoptCapplyDanalyze

单选题You are using a dialup connection. You want to ensure that your password is encrypted. What protocols from the list below would you disable? ()APAPBSPAPCMSCHAPDMSCHAP V2

单选题Your company uses a Windows 2008 Enterprise certificate authority (CA) to issue certificates. You need to implement key archival. What should you do()AArchive the private key on the server.BApply the Hisecdc security template to the domain controllers.CConfigure the certificate for automatic enrollment for the computers that store encrypted files.DInstall an Enterprise Subordinate CA and issue a user certificate to users of the encrypted files.

单选题You are configuring the listener on your server. Which listener.ora parameter contains the information needed to detect session requests from different client types?()AADDRESS_LISTBSID_NAMECLISTENERDSERVICE_LIST

多选题You work as a database administrator for Certkiller .com. Your listener process, L1,is currently listening to three databases:CertK INDB04,Certkiller DB05 and Certkiller DB06. Using Database Configuration Assistant (DBCA) you create one more database,Certkiller DB07,and enable dynamic registration.  Which two commands of Listener Control Utility (lsnrct1) would you use to determine whether the dynamic registration occurred for the database, Certkiller DB07, with the L1 listener process?()ASHOW L1BSPAWN L1CSTATUS L1DSERVICES L1ESTATUS LISTENERFSERVICES LISTENERGSHOWcurrent_listener

单选题Your database is open and the LISTENER listener running. You stopped the wrong listener LISTENER byissuing the following command:lsnrctl STOPWhat happens to the sessions that are presently connected to the database Instance?()AThey are able to perform only queries.BThey are not affected and continue to function normally.CThey are terminated and the active transactions are rolled back.DThey are not allowed to perform any operations until the listener LISTENER is started

单选题As the administrator of your company’s network, you have implemented encryption for extra security of data on your network. A user moves an encrypted file from an NTFS partition on her Windows 2000 Workstation to an NTFS folder on a remote Windows 2000 Server. What effect will this have on the encrypted file?()AThe encrypted file will automatically be decrypted.BEncrypted files and folders cannot be moved or copied, decrypt it first then move or copy thefile or folder.CThe encrypted file will remain encrypted in the Windows 2000 folder.DThe encrypted file will inherit the encryption state of the remote NTFS folder.

单选题While you are working in a space,the fixed CO2 system is accidentally activated.You should().ASecure the applicators to preserve the charge in the cylindersBContinue with your work as there is nothing you can do to stop the flow of CO2CRetreat to fresh air and ventilate the compartment before returningDMake sure all doors and vents are secured