单选题You use—login-path to access a MySQL server on a Linux installation. Which statement is true about the – login-path option that is created by using mysql_config_editor?()AAll system users have access to the MySQL server via—login path localBlogin-path can be used only for MySQL servers running on a local machineClogin-path allows you to provide login credentials without passing clear text passwords on the command lineDWhen using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later

单选题
You use—login-path to access a MySQL server on a Linux installation. Which statement is true about the – login-path option that is created by using mysql_config_editor?()
A

All system users have access to the MySQL server via—login path local

B

login-path can be used only for MySQL servers running on a local machine

C

login-path allows you to provide login credentials without passing clear text passwords on the command line

D

When using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later


参考解析

解析: 暂无解析

相关考题:

LAMP的含义中,以下哪项是完全正确的?()A、linux+access+mysql+phpB、linux+apache+mssql+phpC、linux+apache+mysql+phpD、linux+access+mssql+php

You are deploying a Web site to a server managed by a hosting company. The only access you have to the server is through FTP. You need to precompile and deploy the Web site without its source files. What should you do? ()A、Use the Copy Web tool.B、Use the Publish Web tool.C、Use XCOPY.D、Use the Web Setup project Installer.

You are the network administrator for your company. All network servers run Windows Server 2003. Business hours are 8 A.M. to 5 P.M. You provide network assistance during business hours only. A server named Server1 stores personal files for all network users. Mobile users access Server1 by using the company's VPN. They must have 24-hour access to the files on Server1. You need to be able to identify the source of the recurring slowdowns in VPN access. First, you log on to Server1. What should you do next?()A、Use Task Manager to review network utilization of the VPN adapter.B、Use the Performance console to create a log of network utilization outside of business hours.C、Use System Monitor to review network utilization of the VPN connection.D、Use Task Manager to select Bytes Sent as the Network Adapter History setting.

Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. You have a Remote Desktop Session Host (RD Session Host) server an d a Remote Desktop Web Access (RD Web Access) server.You enable several RemoteApp applications on the RD Session Host server.You need to configure access to RemoteApp applications so that RD Web Access users see only applications to which they have been granted access. What should you do?()A、Use the RemoteApp Wizard to add to the RemoteApp Programs list setting.B、Assign domain users and domain security groups to each RemoteApp application.C、Use the RemoteApp Wizard to configure the RemoteApp program is a vailable through RD Web Access setting.D、Specify custom menu locations on the RD Session Host server for each domain security group by using a Group Policy object (GPO).

You use—login-path to access a MySQL server on a Linux installation. Which statement is true about the – login-path option that is created by using mysql_config_editor?()A、All system users have access to the MySQL server via—login path localB、login-path can be used only for MySQL servers running on a local machineC、login-path allows you to provide login credentials without passing clear text passwords on the command lineD、When using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later

You have a login-path named "adamlocal" that was created by using the mysql_config_editor command. You need to check what is defined for this login_path to ensure that it is correct for you deployment. You execute this command: $mysql_config_editor print –login-path=adamlocal What is the expected output of this command?()A、The command prints all parameter for the login-path. The password is replaced with starsB、The command prints the encrypted entry for the login-path. The is only possible to see if an entry existsC、The command prints all parameters for the login-path. The password is shown only when you provide the –password optionD、The command prints all parameters for the login-path. The password is printed in plain tex

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a computer which hosts several applications in your company. The instance runs on the computer. A job named DiliveryList is created by you. This job requires a file to be written to a file server. But because the job cannot access the file server, it fails to run. You intend to configure the SQL Server Agent service so that only the SQL Server Agent service has read and write access to the file server. Which account type should you use? () A、You should use local Service accountB、You should use network Service accountC、You should use domain accountD、You should use local System account

You are the administrator of an Active Directory domain. All servers run Windows Server 2003.  You configure a server named Server3 as the DNS server for the domain.The company recently started using a new ISP. Since the change to the new ISP occurred, users report that they cannot access Internet Web sites by using their fully qualified domain names (FQDNs).You manually configure a test computer to use the DNS server address of the new ISP. The test computer can successfully access Internet Web sites by using their FQDNs.You need to ensure that network users can access Internet Web sites by using their FQDNs, while ensuring that user access to internal resources is not disrupted.   What are two possible ways to achieve this goal?()A、Create a root zone on Server3.B、Configure Server3 to use the default root hints.C、Configure a forwarder on Server3 to the new ISP’s DNS server.D、Configure all computers on your network to use the new ISP’s DNS server.

You create a Web site that you must copy from a development server to a testing server, along with all source files. You do not have terminal access to the testing server. You need to create the virtual directory. Then you must copy the Web site to the virtual directory on the testing server without precompiling the site. What should you do? ()A、Use the Publish Web tool.B、Use the Copy Web tool.C、Use the command line to XCOPY the files.D、Create a Web Setup project.

Your company runs Remote Desktop Services. You have a Remote Desktop Web Access (RD Web Access) server. You publish several applications on the internal networ k by using RD Web Access. You need to ensure that the published applications are accessible from the Internet via an HTTPS connection over port 443. What should you do first?()A、Use Internet Information Services (IIS) Manager to disable Forms Authentication .B、Use Internet Information Services (IIS) Manager to enable Windows Authentication.C、Install and configure the Remote Desktop Gateway (RD Gateway) role service on the RD Web Access server.D、Install and configure the Remote Desktop Connection Broker (RD Connection Broker) role service on the RD Web Access server.

You install Windows 2000 Professional on your computer at home. You create a new dial-up connection to connect to your company’s remote access server. You configure the connection to use both of your external modems and to use multilink to bind the modems together. You start the dial-up connection and connect to the remote access server. You notice that only one of the modems is connected to the remote access server. What should you do?()A、Configure the dial-up connection to use a SLIP connection.B、Configure the company’s remote access server to accept multilink connections.C、Replace your modems with new modems that support multilink.D、Grant your user account multilink permission on the company’s remote access.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of two SQL Server 2008 instance. The two instances are respectively named InstanceA and InstanceB. There is a database named Dworks on InstanceA. You move the Dworks database to InstanceB. A user use a SQL Server login named Mary to access the database on InstanceA with the password "Tk@87#34". On InstanceB, you create the same SQL Server login. The user tries to use the SQL Server login Mark to access the Dworks database on InstanceB. But the user gets an error message, according to the indication of the message, the access to the Dworks database has been denied. You must make sure that the user can access the Dworks database on InstanceB successfully.  So on InstanceB, which Transact-SQL statements should you execute?()  A、USE AdventureWorks;ALTER USER Mary WITH LOGIN = Mary; B、USE AdventureWorks;ALTER LOGIN Mary ENABLE; C、USE AdventureWorks;ALTER LOGIN Mary WITH PASSWORD = "Tk@87#34" UNLOCK; D、USE AdventureWorks;ALTER LOGIN Mary WITH DEFAULT_DATABASE = AdventureWorks;

You are able to access a Web server from your computer by using the IP address of the Web server. You fail to access the Web server when you use its fully qualified domain name. Other users on your network can access the Web server by using both the IP address and the fully  qualified domain name. You need to access the Web server by using the fully qualified domain name.  What should you do? ()A、Use the Diagnose and repair feature in the Network and Sharing Center.B、At the command prompt, type ipconfig /allcompartments.C、Disable the NetBIOS feature on your network adapter.D、Configure the correct default gateway on the Alternate Configuration tab of your network connection properties dialog box.

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Today you notice that applications that run on the server have poor performances. You doubt that this has something to do with table scans. You have to capture the appropriate information by using an appropriate Windows System Monitor object. In the options below, which performance object should you use? () A、You should use SQLServer:Buffer ManagerB、You should use SQLServer:Memory Manager C、You should use SQLServer:Databases D、You should use SQLServer:Access Methods

You need to design the configuration of the Windows Server 2003 Routing and Remote Access server in the Seattle office to meet business requirements. What should you do?()A、Configure a remote access policy on the Routing and Remote Access server to require MS-CHAP v2 for all connectionsB、Use a Group Policy object (GPO) to configure a Restricted Groups policy that applies to the Routing and Remote Access server. Use this Restricted Groups policy to remove all accounts form the local Users group, and then add authorized computer accountsC、Configure the Routing and Remote Access server to use only PPTP connectionsD、Configure the Routing and Remote Access server to use only IPSec over L2TP connections.Configure IPSec to use certificates

You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.You are responsible for managing an Exchange Server 2010 server named XXX-EX02.What command can be used to determine if the employees can utilize Outlook Anywhere to access XXXEX02?()A、You must use the Test-ImapConnectivity cmdlet.B、You must use the Test-OutlookConnectivity cmdlet.C、You must use the Get-MessageTrackingReport cmd.D、You must use the Exchange Remote Connectivity Analyzer.

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Today you notice that applications that run on the server have poor performances. You doubt that this has something to do with table scans. You have to capture the appropriate information by using an appropriate Windows System Monitor object. In the options below, which performance object should you use? ()AYou should use SQLServer:Buffer ManagerBYou should use SQLServer:Memory Manager CYou should use SQLServer:Databases DYou should use SQLServer:Access Methods

多选题You want to shutdown a running Mysql Server cleanly. Which three commands that are valid on either Windows or Linux will achieve this?()AShell> mysqladmin –u root –p shutdownBShell> nmc mysql shutdownCMysql> STOP PROCESS mysqldDShell> /etc/init.d/mysql stopEShell> service mysql safe_exitFShell> pkill –u mysql mysqld_safeGShell> net stop mysql

单选题You have forgotten the root user account password. You decide to reset the password and execute the following: Shell> /etc/init.d/mysql stop Shell> /etc/init.d/mysql start – skip-grant tables Which additional argument makes this operation safer?()A–skip-networking, to prohibit access from remote locationsB–reset-grant-tables, to start the server with only the mysql database accessibleC–read-only,to set all data to read-only except for super usersD–old-passwords, to start Mysql to use the old password format while running without the grant tables

单选题You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  Server1 is configured as a VPN server.You need to enable trace logging for all Routing and Remote Access components.  Which tool should you use?()ANetdiag.exeBNetcap.exeCNetsh.exeDTracert.exe

单选题You install Windows 2000 Professional on your portable computer. You create a new dial up connection to connect to your company’s remote access server. You connect to the remote access server by using the dial up connection. You can connect to the servers on the same segment as the remote access server. You cannot access the shared resources that are on the remote segments from the remote access server. What should you do? ()AConfigure the company remote access server to accept multilink connections.BConfigure the TCP/IP program for the dial up connection to disable IP header compression.CConfigure the TCP/IP properties for the dial up connection to use the default gateway on theremote network.DGrant your user account dial in permission on the company remote access server.

多选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).You have a VPN server named Server1. You have an Internet Authentication Service (IAS) server named Server2. You need to ensure that all VPN connections to Server1 are authenticated by Server2.Which two actions should you perform?()AFrom the Internet Authentication Service snap-in on Server2, create a new RADIUS client.BFrom the Internet Authentication Service snap-in on Server2, create a new remote access policy.CFrom the Routing and Remote Access snap-in, configure Server1 to use RADIUS accounting.DFrom the Routing and Remote Access snap-in, configure Server1 to use RADIUS authentication.

单选题You are the network administrator for Company.You install Windows 2000 Professional on your computer at home. Your computer contains threemodems, each connected to a separate phone line. You create a new dial-up connection to connect toCompany’s remote access server. You configure the connection to dial up all three devices. You start thedial-up connection and connect to the remote access server. You notice that only one of the modems isconnected to the remote access server.You want to use as many modems as possible to make a single connection to the remote access server.What should you do? ()AConfigure the dial-up connection to sue a SLIP connection.BConfigure all three modems to use the same phone line.CConfigure the remote access server to enable multi-link.DConfigure the dial-up connection to only dial two of the three modems.EConfigure the dial-up connection to Enable LCP extensions.

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a computer which hosts several applications in your company. The instance runs on the computer. A job named DiliveryList is created by you. This job requires a file to be written to a file server. But because the job cannot access the file server, it fails to run. You intend to configure the SQL Server Agent service so that only the SQL Server Agent service has read and write access to the file server. Which account type should you use? ()AYou should use local Service accountBYou should use network Service accountCYou should use domain accountDYou should use local System account

单选题You install a copy of Mysql 5.6.13 on a brand new Linux server by using RPM packages. The server starts successfully as verified by the following commands: $ pidof mysqld 3132 $tail – n2 /var/lib.mysql/hostname.err 2013-08-18 08:18:38 3132 [Note] /usr/sbin/mysqld:ready for connections. Version: '5.6.13-enterprise-commercial-advaced' socket:'/tmp/mysql.sock' port; 3306 Mysql Enterprise Server – Advanced Edition (Commercial) You attempt to log in as the root user with the following command: $mysql – u root ERROR 1045 (28000): Access denied for user 'root'@'localhost' (using password: NO) Which statement is true about this scenario?()AThe RPM installation script sets a default password of password for new installationsBThe local root user must log in with a blank password initially: mysql –u root –pCNew security measures mean that the mysql_secure_installation script must be run first on all new installationsDThe mysql_install_bd post-installation script used – random-password

单选题You have forgotten the root user account password. You decide to reset the password and execute the following: Shell> /etc/init.d/mysql stop Shell> /etc/init.d/mysql start – skip-grant tables Which additional argument makes this operation safer?()A–skip-networking, to prohibit access from remote locationsB–reset-grant-tables, to start the server with only the mysql database accessibleC–read-only,to set all data to read-only except for super usersD–old-passwords, to start Mysql to use the old password format while running without the grant tables

单选题You need to design the configuration of the Windows Server 2003 Routing and Remote Access server in the Seattle office to meet business requirements. What should you do?()AConfigure a remote access policy on the Routing and Remote Access server to require MS-CHAP v2 for all connectionsBUse a Group Policy object (GPO) to configure a Restricted Groups policy that applies to the Routing and Remote Access server. Use this Restricted Groups policy to remove all accounts form the local Users group, and then add authorized computer accountsCConfigure the Routing and Remote Access server to use only PPTP connectionsDConfigure the Routing and Remote Access server to use only IPSec over L2TP connections.Configure IPSec to use certificates