多选题In the admin GUI, you navigate to "System" "Status" "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()ATo forcibly sign out a single user, you should select the check box next to that user's login name, then select Delete Session.BIf you select Delete All Sessions, all users are forcibly signed out and are unable to sign in again until Enable All Users is selected.CSelecting Disable All Users prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.DSelecting Refresh Roles re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.

多选题
In the admin GUI, you navigate to "System" > "Status" > "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()
A

To forcibly sign out a single user, you should select the check box next to that user's login name, then select Delete Session.

B

If you select Delete All Sessions, all users are forcibly signed out and are unable to sign in again until Enable All Users is selected.

C

Selecting Disable All Users prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.

D

Selecting Refresh Roles re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.


参考解析

解析: 暂无解析

相关考题:

A redaction policy was added to the SAL column of the SCOTT.EMP table:All users have their default set of system privileges.For which three situations will data not be redacted?() A. SYS sessions, regardless of the roles that are set in the sessionB. SYSTEM sessions, regardless of the roles that are set in the sessionC. SCOTT sessions, only if the MGR role is set in the sessionD. SCOTT sessions, only if the MGR role is granted to SCOTTE. SCOTT sessions, because he is the owner of the tableF. SYSTEM session, only if the MGR role is set in the session

You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements:SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT;For which database users is the audit policy now active?()A. All users except SYSB. All users except SCOTTC. All users except sys and SCOTTD. All users except sys, system, and SCOTT

Before replacing a MAG Series device, using the admin GUI, you export two backup files, system.cfg from Maintenance ImportfExport Configuration and user.cfg from Maintenance Import/Export Users. When you receive the new hardware, you import all of the settings stored in the system.cfg file (including the IP address, network configuration, and device certificates), but you fail to import the user.cfg file.Which three configuration areas were updated by system.cfg?()A. Cluster configuration settingsB. Static routesC. SNMP settingsD. Sign-in policiesE. MAC authentication realms

A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()A、the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor groupB、the user can see all the users except those in the Admin group, but can only modify the user’s own accountC、the user can see only the user’s own account, and cannot modify itD、the user can see only the user’s own account, and can change the password only

Before replacing a MAG Series device, using the admin GUI, you export two backup files, system.cfg from "Maintenance" "ImportfExport Configuration" and user.cfg from "Maintenance" "Import/Export Users". When you receive the new hardware, you import all of the settings stored in the system.cfg file (including the IP address, network configuration, and device certificates), but you fail to import the user.cfg file. Which three configuration areas were updated by system.cfg?()A、Cluster configuration settingsB、Static routesC、SNMP settingsD、Sign-in policiesE、MAC authentication realms

In the admin GUI, you navigate to "System" "Status" "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()A、To forcibly sign out a single user, you should select the check box next to that user's login name, then select "Delete Session".B、If you select "Delete All Sessions", all users are forcibly signed out and are unable to sign in again until "Enable All Users" is selected.C、Selecting "Disable All Users" prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.D、Selecting "Refresh Roles" re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.

You are designing a Windows Azure web application.  All users authenticate by using their Active Directory Domain Services (AD DS) credentials.  You need to recommend an approach for enabling single sign-on for domain-authenticated users.   Which two actions should you recommend?()A、 Use Forms authenticationto generate claims.B、 Use Active Directory Federation Services (AD FS) to generate claims.C、 Use SqlMembershipProvider in the web application.D、 Use Windows Identity Foundation in the web application.

On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()A、Sign-in PolicyB、Role Mapping RuleC、Role RestrictionsD、Trusted Server CA

You navigate to "UAC" "Infranet Enforcer" "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()A、Dynamic auth table mapping is not enabled.B、A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.C、To create a static auth table mapping, you must delete the default policy.D、The default policy applies only to the factory-default role User.

All the database users are presently connected to the database instance and working. The HR userhas opened three database sessions and executed the following command in one of his sessions: SQL UPDATE persons SET ccode=’U031’ WHERE ccode=’U029’; 123 rows updated.  SQL DELETE FROM persons WHERE exp=’Y’; 3 rows deleted.  The SYS user opens a new session after HR executed the above commands.  Which sessions can seethe effect of the UPDATE and DELETE commands ()A、all sessions of the HR user onlyB、all sessions of the HR user and the SYS userC、the session of the HR user that executed the commandsD、all the sessions for which the database users have access privilege to the PERSONS table

All the database users are presently connected to the database instance and working. The HR user hasopened three database sessions and executed the following command in one of his sessions:SQL UPDATE persons SET ccode=’U031’ WHERE ccode=’U029’; 123 rows updated.SQL DELETE FROM persons WHERE exp=’Y’;3 rows deleted. The SYS user opens a new session after HR executed the above commands.  Which sessions can see theeffect of the UPDATE and DELETE commands()A、All sessions of the HR user onlyB、All sessions of the HR user and the SYS userC、The session of the HR user that executed the commandsD、All the sessions for which the database users have access privilege to the PERSONS table

You work as a database administrator for Certkiller .com. In the Certkiller PRODUCTION database you have granted RESUMABLE system privilege to the CONNECT role.Resumablespace operation has been enabled for all user session. You want users NOT to be aware of any kind of space-related problems while performing transactions. Instead, you want the problem to be resolved by a database trigger automatically. Which combination of triggering time and event would you use to achieve this objective?()A、AFTER CREATEB、AFTER SUSPENDC、BEFORE CREATED、AFTER TRUNCATEE、BEFORE SUSPENDF、AFTER INSERT OR DELETE OR DELETEG、BEFORE INSERT OR DELETE OR DELETE

From the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries and are consuming a lot of CPU time. This causes problems for you when you try to log on as the system user and perform small maintenance tasks. You would like to ensure that users SYS and SYSTEM get priority over all other users.   Which method would you use to achieve this objective?()A、create a plan directive in the SYS_GROUPB、create the pending area for the consumer groupC、activate the provided SYSTEM_PLAN in Resource ManagerD、set the TIMED_STATISTICS parameter to TRUE in the parameter fileE、set the execution time limit for all users, except SYS and SYSTEM, in their profiles

A redaction policy was added to the SAL column of the SCOTT.EMP table: All users have their default set of system privileges. For which three situations will data not be redacted?()A、SYS sessions, regardless of the roles that are set in the sessionB、SYSTEM sessions, regardless of the roles that are set in the sessionC、SCOTT sessions, only if the MGR role is set in the sessionD、SCOTT sessions, only if the MGR role is granted to SCOTTE、SCOTT sessions, because he is the owner of the tableF、SYSTEM session, only if the MGR role is set in the session

The database users are connecting to the PROD database from different applications, thereby degrading the database performance. The senior database administrator suspects the large number of concurrent connections to be the reason for low performance and asks you to restrict the number concurrent connections per database user to one. Which action would you take to achieve this objective? ()A、set the SESSIONS to 1 in the parameter fileB、grant SINGLE SESSION privilege to all of the usersC、set the SESSIONS_PER_USER to 1 in the users’ profileD、grant RESTRICTED SESSION privilege to all of the database usersE、create a role with SINGLE SESSION privilege and assign the role to the users

You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A、All users except SYSB、All users except SCOTTC、All users except sys and SCOTTD、All users except sys, system, and SCOTT

You are the network administrator for . The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All client computers run Windows XP Professional. Multiple users share the same client computer. A server named TestKing2 functions as a file and print server. You set the profile path for all user accounts to //TestKing2/Profiles/username. Some domain users were added to the local Administrators group on the Windows XP Professional computers. A user reports that other users can log on to client computers that he has previously used and gain access to files stored in his My Documents folder on the local hard disk. You need to permanently prevent users from being able to access the My Documents folder of other domain users on the client computers. What should you do?()A、In Active Directory, modify the Default Domain Policy. Disable the Do not check for user ownership of Roaming Profile Folders setting.B、In Active Directory, modify the Default Domain Policy. Enable the Delete cached copies of roaming profiles setting.C、Log on to all client computers and delete all user profiles from the local hard disks.D、Log on to all client computers and configure the Number of previous logons to cache setting to 0.

You are the network administrator for . The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Half of the client computers run Windows XP Professional and the other half run Windows NT 4.0 Workstation. You install Terminal Server on five member servers named TestKingSrvC through TestKingSrvG. You place all five servers in an organizational unit (OU) named Terminal Server. You link a group Policy object (GPO) to the Terminal Server OU. Two days later, users notify you, that the performance of TestKingSrvF is unacceptable slow. You discover that TestKingSrvF has 75 disconnected Terminal Server sessions.You need to configure all five terminal servers to end disconnected sessions after 15 minutes of inactivity. You must achieve this goal by using the minimum amount of administrative effort. What should you do?()A、Log on the console of each terminal server. In the RDP-Tcp connection properties, set the End a disconnected session option to 15 minutes.B、Edit the GPO to set the time limit for disconnected sessions to 15 minutes.C、On TestKingSrvC, run the tsdiscon] command to disconnect all 75 users from TestKingSrvFD、In Active Directory Users and Computers, set the End a disconnected session option for all domain user accounts to 15 minutes.

You have an Exchange Server 2010 organization. Your company’s compliance policy states the following:.Delete e-mail messages sent to legal department users that are older than 180 days. .Delete e-mail messages sent to all other users that are older than 60 days You need to recommend a solution that meets the requirements of the compliance policy. What should you recommend?()A、Configure deleted item retention for all users.B、Configure Personal Archives for the legal department users.C、Create two Managed Folder mailbox policies. Use one policy for the legal department users. Use the other policy for all other users.D、Create two new message classifications. Use one message classification for the e-mails sent to legal department users. Use the other message classification for the e-mails sent to all other users.

多选题You are the network administrator for All network servers run Windows Server 2003. All client computers run Windows XP Professional. You create a folder on thet network and share it as TestKingDocs. You want users to be able to read, create, and modify documents that are stored in the shared folder. You also want users to be able to delete the folders and the files that they create. A user reports that another used deleted a folder that she created. You discover that the Everyone group ias assigned the Allow - Full Control NTFS permission for the folder. You remove all assigned permissions for the Everyone group. You need to configure permission for the TestKingDocs shared folder to meet your requirements. You also need to ensure that users cannot delete the folders and files that other users create. Which two actions should you perform ()(Each correct answer presents part of the solution. Choose two.)AAssign the Authenticated Users group the Allow - Read Execute permission.BAssign the Anonymous group the Allow - Modify permission.CAssign the Creator Owner group the Allow - Modify permission.DAssign the Creator Owner group the Allow - Full Control permission

多选题A redaction policy was added to the SAL column of the SCOTT.EMP table: All users have their default set of system privileges. For which three situations will data not be redacted?()ASYS sessions, regardless of the roles that are set in the sessionBSYSTEM sessions, regardless of the roles that are set in the sessionCSCOTT sessions, only if the MGR role is set in the sessionDSCOTT sessions, only if the MGR role is granted to SCOTTESCOTT sessions, because he is the owner of the tableFSYSTEM session, only if the MGR role is set in the session

多选题You are designing a Windows Azure web application.  All users authenticate by using their Active Directory Domain Services (AD DS) credentials.  You need to recommend an approach for enabling single sign-on for domain-authenticated users.   Which two actions should you recommend?()AUse Forms authenticationto generate claims.BUse Active Directory Federation Services (AD FS) to generate claims.CUse SqlMembershipProvider in the web application.DUse Windows Identity Foundation in the web application.

单选题All the database users are presently connected to the database instance and working. The HR user hasopened three database sessions and executed the following command in one of his sessions:SQL UPDATE persons SET ccode=’U031’ WHERE ccode=’U029’; 123 rows updated.SQL DELETE FROM persons WHERE exp=’Y’;3 rows deleted. The SYS user opens a new session after HR executed the above commands.  Which sessions can see theeffect of the UPDATE and DELETE commands()AAll sessions of the HR user onlyBAll sessions of the HR user and the SYS userCThe session of the HR user that executed the commandsDAll the sessions for which the database users have access privilege to the PERSONS table

多选题Before replacing a MAG Series device, using the admin GUI, you export two backup files, system.cfg from "Maintenance" "ImportfExport Configuration" and user.cfg from "Maintenance" "Import/Export Users". When you receive the new hardware, you import all of the settings stored in the system.cfg file (including the IP address, network configuration, and device certificates), but you fail to import the user.cfg file. Which three configuration areas were updated by system.cfg?()ACluster configuration settingsBStatic routesCSNMP settingsDSign-in policiesEMAC authentication realms

多选题You are the network administrator for Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows 2000 Professional. You install Windows Server 2003 with default settings on a new computer named TestKingSrv1. You install and share several printers on TestKingSrv1. You instruct all users to connect to these printers by using the address http://TestKingSrv1/Printers. However, users report that they cannot connect to this address. You need to ensure that all users can connect to the printers by using HTTP. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)APublish all shared printers that are installed on TestKingSrv1.BCreate a virtual directory named Printers on TestKingSrv1.CInstall IIS with default settings on TestKingSrv1.DReshare all printers on TestKingSrv1.EInstall the Internet Printing component of IIS.FType Net Stat W3SVC at a command prompt.

单选题You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()AAll users except SYSBAll users except SCOTTCAll users except sys and SCOTTDAll users except sys, system, and SCOTT

单选题The database users are connecting to the PROD database from different applications, thereby degrading the database performance. The senior database administrator suspects the large number of concurrent connections to be the reason for low performance and asks you to restrict the number concurrent connections per database user to one. Which action would you take to achieve this objective? ()Aset the SESSIONS to 1 in the parameter fileBgrant SINGLE SESSION privilege to all of the usersCset the SESSIONS_PER_USER to 1 in the users’ profileDgrant RESTRICTED SESSION privilege to all of the database usersEcreate a role with SINGLE SESSION privilege and assign the role to the users