多选题Consider the MySQL Enterprise Audit plugin, You add the following lines to the my.cnf configuration tile: [mysqld] Plugin-load=audit_log.so Audit-log=FORCE_PLUS_PERMANENT You attempt to start up the MySQL service and notice that it fails to start. Which two statements would explain why the service did not start?()AFORCE_PLUS_PERMANENT is not valid for the audit-log optionBThe audit_log.so library does not existCThe audit_log.so library is in a location that is different from that defined by the plugin_dir optionDThe audit plugin must be loaded dynamically by using the INSTALL PLUGIN commandEThe audit log file does not exist in which to write audit eventsFThe audit_log.so library is not an executable file

多选题
Consider the MySQL Enterprise Audit plugin, You add the following lines to the my.cnf configuration tile: [mysqld] Plugin-load=audit_log.so Audit-log=FORCE_PLUS_PERMANENT You attempt to start up the MySQL service and notice that it fails to start. Which two statements would explain why the service did not start?()
A

FORCE_PLUS_PERMANENT is not valid for the audit-log option

B

The audit_log.so library does not exist

C

The audit_log.so library is in a location that is different from that defined by the plugin_dir option

D

The audit plugin must be loaded dynamically by using the INSTALL PLUGIN command

E

The audit log file does not exist in which to write audit events

F

The audit_log.so library is not an executable file


参考解析

解析: 暂无解析

相关考题:

Consider the Mysql Enterprise Audit plugin. The following event detail is found in the audit log:Which two points can be concluded from the given event?() A.A connection as the user kate was successfulB.A connection failed due to authentication being unsuccessfulC.A connection was attempted via socket rather than TCPD.A connection was blocked by a firewall or a similar security mechanismE.A connection failed because the proxy user privileges did not match the login user

Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A、to add second factor based authentication to a Web applicationB、to pre-populate user wallets with all their application credentials in one goC、to enhance out-of-the-box audit logging by creating custom audit log eventsD、to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnE、to configure automatic password change on expiry for an application so that the new password is a random string of specified strength

Consider the Mysql Enterprise Audit plugin. A CSV file called data.csv has 100 rows of data. The stored procedure prepare_db ( ) has 10 auditable statements. You run the following statements in the mydb database: Mysql> CALL prepare_db ( ); Mysql> LOAD DATA INFILE '/tmp/data.cav' INTO TABLE mytable; Mysql> SHOW TABLES; How many events are added to the audit log as a result of the preceding statements?()A、12; only top-level statements and stored procedure events are loggedB、111; top-level statements and all lower-level statements are loggedC、3; only the top-level statements are loggedD、102; top-level statements are logged, but LOAD DATA INFILE is logged as a separate event

Consider the MySQL Enterprise Audit plugin, You add the following lines to the my.cnf configuration tile: [mysqld] Plugin-load=audit_log.so Audit-log=FORCE_PLUS_PERMANENT You attempt to start up the MySQL service and notice that it fails to start. Which two statements would explain why the service did not start?()A、FORCE_PLUS_PERMANENT is not valid for the audit-log optionB、The audit_log.so library does not existC、The audit_log.so library is in a location that is different from that defined by the plugin_dir optionD、The audit plugin must be loaded dynamically by using the INSTALL PLUGIN commandE、The audit log file does not exist in which to write audit eventsF、The audit_log.so library is not an executable file

You work as the enterprise exchange administrator at TestKing.com. The TestKing.com network consistsof an Active Directory forest that contains a single domain named testking.com. TestKing.com has anExchange Server 2010 organization. For the future, you envisage to add a new domain to the forest as well as deploying the Exchange Server2010 servers in the domain. A TestKing.com employee named Andy Reid that is a member of an ActiveDirectory group. You have received instructions from the CIO to allow Andy Reid to install ExchangeServer 2010 servers in the new domain.  You thus nedd to identify the appropriate group to which AndyReid should be assigned()A、You should add Andy Reid to the Server Operators group.B、You should add Andy Reid to the Domain Admins group.C、You should add Andy Reid to the Enterprise Admins group.D、You should add Andy Reid to the Exchange Install Domain Servers group.

You need to design a PKI for Litware, Inc. What should you do?()A、Add one offline stand-alone root certificate authority(CA).Add two online enterprise subordinate CAsB、Add one online stand-alone root certification authority(CA).Add two online enterprise subordinate CAsC、Add one online enterprise root certification authority CA).Add one offline enterprise subordinate CAD、Add one online enterprise root certification authority(CA).Add two online enterprise subordinate CAs

You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()A、The — ssl level was not specifiedB、The server was not started with the – enable–ssl-plugin optionC、— ssl is not a valid server optionD、The mysqld binary was not compiled with SSL supportE、The server's SSL certificate was invalid

Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()A、The attribute "STATUS" is set to the string EXTERNAL_AUTHB、The attribute "PRIV_USER" contains the usernameC、The event type that is given in the attribute "NAME" is EXTERNAL_AUTHD、There is no differentiation between native and external authentication eventsE、External authentication is managed through external auditing logsF、The "PROXY_PRIV" user shows a username if external authentication is used

Your company has an Active Directory forest. You plan to install an Enterprise certification authority (CA) on a dedicated stand-alone server. When you attempt to add the Active Directory Certificate Services (AD CS) role, you find that the Enterprise CA option is not available. You need to install the AD CS role as an Enterprise CA. What should you do first()A、Add the DNS Server role.B、Join the server to the domain.C、Add the Web server (IIS) role and the AD CS role.D、Add the Active Directory Lightweight Directory Service (AD LDS) role.

Your company has an Active Directory forest. You plan to install an Enterprise certification  authority (CA) on a dedicated stand-alone server. When you attempt to add the Active Directory Certificate Services (AD CS) server role, you find  that the Enterprise CA option is not available. You need to install the AD CS server role as an Enterprise CA.     What should you do first()A、Add the DNS Server server role.B、Join the server to the domain.C、Add the Web Server (IIS) server role and the AD CS server role.D、Add the Active Directory Lightweight Directory Services (AD LDS) server role.

You work as an administrator at ENSUREPASS.com. The ENSUREPASS.com network consists of a single domain named ENSUREPASS.com.Subsequent to deploying a Server Core Installation of Windows Server 2012 on a new ENSUREPASS.com server, you are instructed to add a graphical user interface (GUI) to the server.You want to achieve this goal from the command prompt. Which of the following actions should you take?()A、You should consider making use of the dism.exe command.B、You should consider making use of the dsquery.exe commandC、You should consider making use of the dsadd.exe commandD、You should consider making use of the dsrm.exe command

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to add a new domain controller to ABC.com’s existing environment. Which of the following actions should you take?()A、You should consider making use of Server Manager.B、You should consider making use of Authorization Manager.C、You should consider making use of Remote Desktop Gateway Manager.D、You should consider making use of Network Load Balancing Manager.

Your company has an Active Directory forest. You plan to install an Enterprise certification authority  (CA) on a dedicated stand-alone server.    When you attempt to add the Active Directory Certificate Services (AD CS) server role, you find that the  Enterprise CA option is not available.    You need to install the AD CS server role as an Enterprise CA.    What should you do first()A、Add the DNS Server server role.B、Join the server to the domain.C、Add the Web Server (IIS) server role and the AD CS server roleD、Add the Active Directory Lightweight Directory Services (AD LDS) server role. .

You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .The Xxx network has a mail server named XXX-EX01.What actions must you take to do an unattended installation of Exchange Server 2010 server on XXXEX01?()A、You should add recipient filter.B、You should add create Send connectors.C、You should run setup /ps.D、You should add setup.com in the script.

You are designing a Windows 7 deployment image.  You plan to install Windows 7 Enterprise with a Multiple Activation Key (MAK).    You need to add the MAK to the configuration pass by using an answer file.   To which configuration pass should you add the MAK?()A、the Specialize configuration passB、the Generalize configuration passC、the WindowsPE configuration passD、the AuditSystem configuration pass

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.You have received instructions from the CIO to support Autodiscover from the Internet by creating a resource record in DNS.What should you do?()A、You should consider creating a Host (A) resource record.B、You should consider creating a Text (TXT) resource record.C、You should consider creating a Pointer (PTR) resource record.D、You should consider creating a Mail exchange (MX) resource record.

You need to design a PKI for the Northwind Traders internal network. What should you do?()A、Add an enterprise root CA to the northwindtraders.com domain. Configure cross-certification between the northwindtraders.com domain and the boston.northwindtraders.com domainB、Add an enterprise subordinate issuing CA to the northwindtraders.com domain. Configure qualified subordination for the enterprise subordinate issuing CA in BostonC、Add enterprise subordinate issuing CAs to the New York, Boston, and Seattle LANs. Configure qualified subordinations for each enterprise subordinate issuing CAD、Add a stand-alone commercial issuing CA to only the northwindtraders.com domain. Configure cross-certification between the commercial CA and the boston.northwindtraders.com domain

You are employed as the enterprise exchange administrator at Company.com..com makes use of Microsoft exchange server 2010 messaging solution.you are responsible for managing the exchange network for Company.com.you are experiencing various problems in the exchange environment.you decide to determine whether one of the other administrators executed any configuration changes in the organization.What should you do?()A、You should consider running Exchange Best Practices Analyzer.B、You should consider running Microsoft Baseline Security Analyzer (MBSA).C、You should consider running the Get-ExchangeServer cmdlet.D、You should consider running the Get-EventLogLevel cmdlet.

单选题You are designing a Windows 7 deployment image.  You plan to install Windows 7 Enterprise with a Multiple Activation Key (MAK).    You need to add the MAK to the configuration pass by using an answer file.   To which configuration pass should you add the MAK?()Athe Specialize configuration passBthe Generalize configuration passCthe WindowsPE configuration passDthe AuditSystem configuration pass

多选题Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()Ato add second factor based authentication to a Web applicationBto pre-populate user wallets with all their application credentials in one goCto enhance out-of-the-box audit logging by creating custom audit log eventsDto create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-OnEto configure automatic password change on expiry for an application so that the new password is a random string of specified strength

单选题You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()AThe — ssl level was not specifiedBThe server was not started with the – enable–ssl-plugin optionC— ssl is not a valid server optionDThe mysqld binary was not compiled with SSL supportEThe server's SSL certificate was invalid

单选题While reviewing the MySQL error log, you see occasions where MySQL has exceeded the number of file handles allowed to it by the operating system. Which method will reduce the number of file handles in use?()AActivating the MySQL Enterprise thread pool pluginBRelocating your data and log files to separate storage devicesCDisconnecting idle localhost client sessionsDImplementing storage engine data compression options

单选题Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()AThe attribute STATUS is set to the string EXTERNAL_AUTHBThe attribute PRIV_USER contains the usernameCThe event type that is given in the attribute NAME is EXTERNAL_AUTHDThere is no differentiation between native and external authentication eventsEExternal authentication is managed through external auditing logsFThe PROXY_PRIV user shows a username if external authentication is used

多选题Consider the MySQL Enterprise Audit plugin, You add the following lines to the my.cnf configuration tile: [mysqld] Plugin-load=audit_log.so Audit-log=FORCE_PLUS_PERMANENT You attempt to start up the MySQL service and notice that it fails to start. Which two statements would explain why the service did not start?()AFORCE_PLUS_PERMANENT is not valid for the audit-log optionBThe audit_log.so library does not existCThe audit_log.so library is in a location that is different from that defined by the plugin_dir optionDThe audit plugin must be loaded dynamically by using the INSTALL PLUGIN commandEThe audit log file does not exist in which to write audit eventsFThe audit_log.so library is not an executable file

单选题You need to design a PKI for Litware, Inc. What should you do?()AAdd one offline stand-alone root certificate authority(CA).Add two online enterprise subordinate CAsBAdd one online stand-alone root certification authority(CA).Add two online enterprise subordinate CAsCAdd one online enterprise root certification authority CA).Add one offline enterprise subordinate CADAdd one online enterprise root certification authority(CA).Add two online enterprise subordinate CAs

单选题Consider the Mysql Enterprise Audit plugin. A CSV file called data.csv has 100 rows of data. The stored procedure prepare_db ( ) has 10 auditable statements. You run the following statements in the mydb database: Mysql> CALL prepare_db ( ); Mysql> LOAD DATA INFILE '/tmp/data.cav' INTO TABLE mytable; Mysql> SHOW TABLES; How many events are added to the audit log as a result of the preceding statements?()A12; only top-level statements and stored procedure events are loggedB111; top-level statements and all lower-level statements are loggedC3; only the top-level statements are loggedD102; top-level statements are logged, but LOAD DATA INFILE is logged as a separate event

单选题Consider the MySQL Enterprise Audit plugin. On attempting to start the MySQL service after a crash, notice the following error: [ERROR] Plugin ‘audit_log’ init function returned error. In the audit log file, you notice the final entry: … What action should you take to fix the error and allow the service to start?()A Re-install the audit pluginB Execute the command FLUSH LOGSC Execute the command SET GLOBAL audit_log_fiush= OND Move or rename the existing audit.log file

单选题You install a copy of Mysql 5.6.13 on a brand new Linux server by using RPM packages. The server starts successfully as verified by the following commands: $ pidof mysqld 3132 $tail – n2 /var/lib.mysql/hostname.err 2013-08-18 08:18:38 3132 [Note] /usr/sbin/mysqld:ready for connections. Version: '5.6.13-enterprise-commercial-advaced' socket:'/tmp/mysql.sock' port; 3306 Mysql Enterprise Server – Advanced Edition (Commercial) You attempt to log in as the root user with the following command: $mysql – u root ERROR 1045 (28000): Access denied for user 'root'@'localhost' (using password: NO) Which statement is true about this scenario?()AThe RPM installation script sets a default password of password for new installationsBThe local root user must log in with a blank password initially: mysql –u root –pCNew security measures mean that the mysql_secure_installation script must be run first on all new installationsDThe mysql_install_bd post-installation script used – random-password