You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()A、 DBMS_RLS.STATICB、 DBMS_RLS.DYNAMICC、 DBMS_RLS.SHARED_STATICD、 DBMS_RLS.CONTEXT_SENSITIVEE、 DBMS_RLS.SHARED_CONTEXT_SENSITIVE

You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()

  • A、 DBMS_RLS.STATIC
  • B、 DBMS_RLS.DYNAMIC
  • C、 DBMS_RLS.SHARED_STATIC
  • D、 DBMS_RLS.CONTEXT_SENSITIVE
  • E、 DBMS_RLS.SHARED_CONTEXT_SENSITIVE

相关考题:

Your network consists of numerous domains within a LAN, plus one remote location that is configured as another domain within the tree. Each domain contains several organizational units. The remote domain is connected to the main office network by using 56-Kbps connection, as shown in the Exhibit.The remote location is running a previous service pack for Windows 2000, and the LAN is running the most recent service pack.You want to configure a group policy for the remote location so that users can repair a problem with a service pack system file. You also want to reduce the traffic on the LAN and ease administration of the group policies. You want to retain the domain administrator's access to the group policy configuration.What should you do?A.Configure a group policy for each OU in the west.litware.com domain. Configure a service pack software package for each group policy.B.Configure a group policy for each OU in the litware.com domain. Configure a service pack software package for each group policy.C.Configure a group policy for west.litware.com domain. Configure a service pack software package for the group policy.D.Configure a group policy for the litware.com domain. Configure a service pack software package for the group policy.

Which two statements apply to policy scheduling?() (Choose two.) A. An individual policy can have only one scheduler applied.B. You must manually configure system-time updates.C. Multiple policies can use the same scheduler.D. Policies that do not have schedulers are not active.

Which two statements apply to policy scheduling?() (Choose two.)A、An individual policy can have only one scheduler applied.B、You must manually configure system-time updates.C、Multiple policies can use the same scheduler.D、Policies that do not have schedulers are not active.

Which two firewall user authentication objects can be referenced in a security policy?()A、access profileB、client groupC、clientD、default profile

You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()A、 Delegate the password management controls to the help desk staff.B、 Delegate the password management controls to the Domain Users group.C、 Configure the Default Domain Policy to enforce password expiration settings.D、 Configure the Default Domain Controller Policy to enforce password expiration settings.

You are a database administrator for your company. The company uses a SQL Server 2005 database that includes a table named Inventory. The table contains a column named Price. A company policy states that the value in the Price column cannot be decreased by more than 10 percent in any single database operation. Updates to the Price column are made by various means, including by using ad hoc queries. You need to ensure that this company policy is enforced. What should you do?()A、Create a trigger that rolls back changes to the Price column that violate company policy.B、Create a stored procedure that disallows changes to the Price column that violate company policy.C、On the Price column, create a check constraint that requires a specified minimum value.D、On the Price column, create a foreign key constraint to a table that contains valid prices.

Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A、 the business knowledge of the IT staffB、 the technical knowledge of the IT staffC、 the company’s business objectivesD、 the company’s network topologyE、 the IT future directions

You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()A、Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.B、Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.C、Configure the Host Checker policy as a role restriction for the Employee role.D、Configure the Host Checker policy as a resource access policy for the Employee role.

Which two statements are true about applying Host Checker at the realm level?()A、If Evaluate is checked then the client must pass policy to get the sign-in page.B、If Evaluate is checked then the client can fail policy and still get the sign-in page.C、If Require and Enforce is checked then the client must pass policy to get the sign-in page.D、If Require and Enforce is checked then the client can fail policy and still get the sign-in page.

Which two statements are true with regard to policy ordering? ()(Choose two.)A、The last policy is the default policy, which allows all traffic.B、The order of policies is not important.C、New policies are placed at the end of the policy list.D、The insert command can be used to change the order.

You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()A、The endpoints can use agentless access.B、Encrypted traffic flows between the endpoint and the enforcer.C、Encrypted traffic flows between the endpoint and the protected resourceD、The endpoints can use the Odyssey Access Client.

Which two statements regarding the Policy Framework in Enterprise Manager (EM) are correct?()A、Policy violations are prioritized as High, Medium, or Informational by category B、Policies can be disabled completely, or flagged as ignored, for the specified target C、Policies can be flagged as ignored, but never completely disabled, for the specified targetD、Policy violations must be corrected, otherwise the database will shut down until corrective action occurs

You want to enforce a company’s business policy on several objects by using a singlepolicy function.  Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective?()A、DBMS_RLS.STATICB、DBMS_RLS.DYNAMICC、DBMS_RLS.SHARED_STATICD、DBMS_RLS.CONTEXT_SENSITIVEE、DBMS_RLS.SHARED_CONTEXT_SENSITIVE

ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU.  You need to verify that users are connecting to the two servers by using encrypted connections.   What should you do?()A、Run the net view command.B、Run the gpresult command.C、Use the IP Security Monitor console.D、Use the IPSec Policy Management console.

You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A new management directive states that users can log to the domain only during business hours. Users who remain logged on after business hours must be automatically disconnected from network resources. You need to enforce this directive by using the minimum amount of administrative effort. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two)A、Configure the Default Domain Policy Group Policy object (GPO) to increase scheduling priority for all users.B、Configure the Default Domain Policy Group Policy object (GPO) to force users to log off when their logon hours expire.C、Select all user accounts. Modify the account properties to restrict logon hours to business hours.D、Create a domain user account named Temp. Configure the account properties to restrict logon hours to business hours.E、Modify the DACL on the Default Domain Policy Group Policy object (GPO) to assign the Allow - Read permission to the Users group.

You are the network administrator for Humongous Insurance. The network consists of a single Active Directory domain named humongous.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure several Group Policy objects (GPOs) to enforce the use of IPSec for certain types of communication between specified computers.   A server named Server2 runs the Telnet service. A GPO is supposed to ensure that all Telnet connections to Server2 are encrypted by using IPSec. However, when you monitor network traffic, you notice that Telnet connections are not being encrypted.You need to view all of the IPSec settings that are applied to Server2 by GPOs. Which tool should you use?()A、the IP Security Policy Management consoleB、the IP Security Monitor consoleC、the Resultant Set of Policy consoleD、Microsoft Baseline Security Analyzer (MBSA)

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is an internal application which uses Analysis Services and Reporting Services. You use the application on the basis of SQL Server 2008. According to the requirement of company security policy, the surface area for all the deployed components of SQL Server 2008 should be configured. You have to implement the security policy and devise a method to evaluate the security policy against other database servers. What should you do?()  A、You should create policies based on the appropriate facets. Apply the policies against a server group. The server group includes the database servers that need to be configured B、You should create a Transact-SQL script based on the sp_configure stored procedure. Use a configuration server to run the script against a server group that includes the database servers that need to be configured C、You should edit the RSReportServer.config configuration file. Distribute the file to all database servers that need to be configured D、You should analyze your database servers by using the SQL Server Best Practices Analyzer (BPA). Implement the recommendations of the BPA

You are designing for implementing Group Policy objects (GPOs) to meet the business and technical requirement. What should you do?()A、Create one new GPO to enforce software restriction policies. Link this GPO to the domain.B、Create one new GPO to enforce software restriction policies. Link this GPO to the appropriate  organizational unit (OU).C、Create one new GPO to enforce software restriction policies. Link this GPO to all organizational units (OUs).D、Create new GPOs to match the number of organizational units (OUs).configure these GPOs to enforce software restriction policies. Link this GPO to its respective OU.

You are the desktop administrator for your company's sales department. The IT manager for the sales department creates a custom policy that will apply to a custom application that is loaded on the department's Windows XP Professional computers. He deploys this policy by using Group Policy. When you inspect the sales department's computers, you find out that the application has not been modified by the policy. You want to examine Windows XP Professional to find out whether the custom policy is affecting the correct location in the Registry. Which command should you run?()A、Msinfo32. exeB、Gpresult.exeC、Gpedit.mscD、Rsop.msc

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. According to the company requirement, the names of all user-defined stored procedures must contain the prefix usp_ on all instances. Besides this, you must make sure that stored procedures that do not contain this prefix cannot be created by you. What should you do?()  A、A policy should be created. The policy targets the name of the stored procedure that is evaluated on demand. B、A policy should be created. The policy targets the name of the stored procedure that is evaluated on change. C、A condition should be created. The condition targets the name of the stored procedure that is evaluated on change D、A condition should be created. The condition targets the name of stored procedure that is evaluated on demand.

Your network consists of a single Active Directory forest. The forest functional level is Windows Server 2008 R2. The forest contains two domains named contoso.com and na.contoso.com.   Contoso.com contains a user named User1. Na.contoso.com contains an organizational unit (OU) named  Security.   You need to give User1 administrative rights so that he can manage Group Policies for the Security OU.   You want to achieve this goal while meeting the following requirements:   èUser1 must be able to create and configure Group Policies in na.contoso.com. èUser1 must be able to link Group Policies to the Security OU.   èUser1 must be granted the least administrative rights necessary to achieve the goal. What should you do?()A、Add User1 to the Administrators group for na.contoso.com.B、Add User1 to the Group Policy Creator Owners group in contoso.com. Modify the permissions on the scurity OU.C、Run the Delegation of Control Wizard on the Security OU. In the Group Policy Management Console,modify the permissions of the Group Policy Objects container in the na.contoso.com domain.D、Run the Delegation of Control Wizard on na.contoso.com. In the Group Policy Management Console, modify the permissions of the Group Policy Objects container in the contoso.com domain.

多选题Which two statements are true with regard to policy ordering? ()(Choose two.)AThe last policy is the default policy, which allows all traffic.BThe order of policies is not important.CNew policies are placed at the end of the policy list.DThe insert command can be used to change the order.

多选题You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()ADBMS_RLS.STATICBDBMS_RLS.DYNAMICCDBMS_RLS.SHARED_STATICDDBMS_RLS.CONTEXT_SENSITIVEEDBMS_RLS.SHARED_CONTEXT_SENSITIVE

单选题You are designing for implementing Group Policy objects (GPOs) to meet the business and technical requirement.  What should you do? ()A Create one new GPO to enforce software restriction policies. Link this GPO to the domain.B Create one new GPO to enforce software restriction policies. Link this GPO to the appropriate organizational unit (OU).C Create one new GPO to enforce software restriction policies. Link this GPO to all organizational units (OUs).D Create new GPOs to match the number of organizational units (OUs).configure these GPOs to enforce software restriction policies. Link this GPO to its respective OU.

多选题Which two statements are true about applying Host Checker at the realm level?()AIf Evaluate is checked then the client must pass policy to get the sign-in page.BIf Evaluate is checked then the client can fail policy and still get the sign-in page.CIf Require and Enforce is checked then the client must pass policy to get the sign-in page.DIf Require and Enforce is checked then the client can fail policy and still get the sign-in page.

单选题Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A the business knowledge of the IT staffB the technical knowledge of the IT staffC the company’s business objectivesD the company’s network topologyE the IT future directions

多选题You want to enforce a company’s business policy on several objects by using a singlepolicy function.  Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective?()ADBMS_RLS.STATICBDBMS_RLS.DYNAMICCDBMS_RLS.SHARED_STATICDDBMS_RLS.CONTEXT_SENSITIVEEDBMS_RLS.SHARED_CONTEXT_SENSITIVE