You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()A、It is a list of remote database links stored in the XML file that are available to the users of the database.B、It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.C、It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.D、It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()

  • A、It is a list of remote database links stored in the XML file that are available to the users of the database.
  • B、It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
  • C、It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
  • D、It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

相关考题:

You have two servers that run windows server 2008 named server1 and server2. You install WSUS on both servers. You need to configure WSUS on server1 to receive updates from server2. What should you do on server1?()A.Configure a proxy server.B.Configure a upstream server.C.Create a new replica group.D.Create a new computer group.

You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?A.Configure an ADM template and add the template to the GPO.B.Configure an INF policy and add the policy to the GPO.C.Configure a Microsoft Windows installer package and add the package to the GPO.D.Configure RIS to include the registry entry.

You install a wireless router and disable the Service Set identifier (SSID) broadcast feature. You need to configure your computer to connect to the wireless network.What should you do?() A.AB.BC.CD.D

You need to configure the power settings of your portable computer so that the display turns off when it is inactive and running on battery power. You also need to ensure that the power settings of the hard disk remain unaffected.What should you do?()A.AB.BC.CD.D

You need to configure Microsoft Windows Firewall to allow technicians to remotely control your computer.Which exception should you enable?() A.AB.BC.CD.D

You have a computer that runs Windows Vista.You need to configure your computer so that you can interact with your desktop when you are prompted for user account control permissions.What should you do?()A.AB.BC.CD.D

When do you need to configure the P1 interface?()A、 whenever you have an upstream proxyB、 whenever you intend to deploy the L4TM in blocking modeC、 whenever you want to enable the WSA proxyD、 whenever you have a separate management VLAN orsubnetwork

You installed WebLogic, SOA Suite, and Oracle Service Bus on a machine and want to use the  WebLogic Node Manager to start servers for each product. Which statement is true?()A、You need to install a separate node manager for each Middleware Home that has a unique and  minor WebLogic Version Number.B、You need to install and configure only one instance of Node Manager for all products,  regardless of the WebLogic version number.C、You need to install and configure a separate Node Manager for each domain of each product  want to run on the machine.D、You need to install one Node Manager but use separate SSL certificates for each product when  securing the network communication to the machine.

You are preparing to install an operating system on virtual machines (VMs) in a Hyper-V environment. You need to configure each VM so that you can perform a network-based operating system installation. What should you do for each VM?()A、Add a Network Adapter.B、Add a Legacy Network Adapter.C、Configure a static MAC address.D、Configure a dynamic MAC address.

You are designing a Windows Azure application.   Corporate policy dictates that you must retain all application logs.   You need to recommend an approach for complying with the corporate policy.  What should you recommend?()A、 Perform on-demand transfers.B、 Configure scheduled transfers.C、 Configure a diagnostic trace listener.D、 Increase the diagnostics buffer quotas.

You are managing a database for which incremental backups can be very time consuming. In order to perform optimized incremental backups you enable the block change tracking feature.How would you instruct RMAN to use the block change tracking feature when performing incremental backups?()A、 You need to mention it with every BACKUP command.B、 The block change tracking feature is used automatically by RMAN.C、 You need to configure it using the CONFIGURE command.D、 You need to set the necessary initialization parameters to direct RMAN to use the feature.

Your company has multiple DNS servers in the main office.You plan to install DNS on a member server in a branch office.You need to ensure that the DNS server in the branch office is able to query any DNS server in the main office, and you need to limit the number of DNS records that are transferred to the DNS server in the branch office.What should you do?()A、Configure a secondary zone on the DNS server in the branch office.B、Configure a stub zone on the DNS server in the branch office.C、Configure a stub zone on the DNS server in the main office.D、Configure a primary zone on the DNS server in the branch office.

You need to design a remote access solution for the mobile sales users in the litwareinc.com domain. Which two actions should you perform?()A、Configure autoenrollment for user certificates and computer certificatesB、Configure Web enrollment for user certificates and computer certificatesC、Configure a Certificate Services hierarchy in the litwareinc.com domainD、Configure qualified subordination between the litwareinc.com and the contoso.com domainsE、Configure PEAP authentication on the remote access servers

You have an Exchange Server 2010 organization.You need to configure the organization to reject all e-mail messages that have a spam confidence level (SCL) that is greater than 7.What should you configure?()A、content filteringB、recipient filteringC、sender filteringD、sender reputation

Your portable computer is in sleep mode. When you resume work on the portable computer, you are not prompted for a password.  You need to ensure that you are prompted for a password each time the portable computer recovers from sleep mode.  What should you do?()A、Configure the computer to hibernate when not in use.B、In the current power plan settings, configure the computer to require a password when recovering from sleep mode.C、Configure the computer to use the High Performance power plan.D、Configure the screen saver settings to require a password on resumption of work.

You need to recommend a strategy for the file servers that meets the company’s technical requirements.   What should you recommend?()A、Implement active file screens.B、Implement passive file screens.C、Configure classification rules.D、Configure File Server Resource Manager (FSRM) quotas.

You have two servers that run Windows Server 2008 named Server1 and Server2. You install WSUS on both servers. You need to configure WSUS on Server1 to receive updates from Server2. What should you do on Server1? ()A、 Configure a proxy serverB、 Configure a upstream serverC、 Create a new replica groupD、 Create a new computer group

You need to configure the power settings of your portable computer so that the display turns off when it is inactive and running on battery power. You also need to ensure that the power settings of the hard disk remain unaffected.  What should you do?()A、Change the advanced power settings of the Balanced power plan.B、Configure the portable computer to use the Power saver power plan.C、Configure the portable computer to use the High performance power plan.D、Restore the Power Saver power plan to the default settings.

You need to increase the reliability of the print server on the main campus. What should you do?()A、Create printer pools.B、Configure printer redirection.C、Configure printer driver isolation.D、Change the location of the Spool folder.

Your company has an organizational unit named Production. The Production organizational unit has achild organizational unit named RD. You create a GPO named Software Deployment and link it to the  Production organizational unit. You create a shadow group for the RD organizational unit.   You need to deploy an application to users in the Production organizational unit.  You also need to ensure  that the application is not deployed to users in the RD organizational unit.    What are two possible ways to achieve this goal()A、Configure the Enforce setting on the software deployment GPO.B、Configure the Block Inheritance setting on the RD organizational unit.C、Configure the Block Inheritance setting on the Production organizational unit.D、Configure security filtering on the Software Deployment GPO to Deny Apply group policy for the RD  security group.

A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A、service Authentication ManagerB、service AuthorizationC、service CredentialsD、service Security Audit

You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

You have an Exchange Server 2010 Edge Transport server named Server1.You create a spam quarantine mailbox on a Mailbox server.You need to configure Server1 to send spam e-mail messages to the quarantine mailbox.Which properties should you configure?()A、content filteringB、default Receive connectorC、Send connectorD、sender filtering

You have a computer that runs Windows 7. You have a third-party application. You need to ensure that onlya specific version of the application runs on the computer. The solution must ensure that all applicationrestrictions are based on the application vendor s digital signature.  What should you do?()A、From Application Control Policies, configure a path rule.B、From Application Control Policies, configure a publisher rule.C、From Software Restriction Policies, configure a path rule.D、From Software Restriction Policies, configure a certificate rule.

You need to configure Microsoft Windows Fax and Scan to send and receive faxes.  What should you do? ()A、Create a new fax account.B、Configure the fax settings to require manual receipt of faxes.C、Configure the fax security settings to permit Send and Receive.D、Configure the Transmitting Subscriber ID (TSID) of the fax with the correct phone number.

单选题You are managing a database for which incremental backups can be very time consuming. In order to perform optimized incremental backups you enable the block change tracking feature.How would you instruct RMAN to use the block change tracking feature when performing incremental backups?()A You need to mention it with every BACKUP command.B The block change tracking feature is used automatically by RMAN.C You need to configure it using the CONFIGURE command.D You need to set the necessary initialization parameters to direct RMAN to use the feature.

单选题You are designing a plan to migrate an application to Windows Azure.  The application generates log files in a proprietary format.  You need to recommend an approach for retaining the existing log file format.  What should you recommend?()A Configure Windows Azure Diagnostics to transfer event logs.B Configure Windows Azure Diagnostics to transfer directories.C Configure Windows AzureDiagnostics to transfer performance counters.D Configure Windows Azure Diagnostics to transfer basic Windows Azure logs.

单选题Your company has multiple DNS servers in the main office. You plan to install DNS on a member server in a branch office. You need to ensure that the DNS server in the branch office is able to query any DNS server in the main office, and you need to limit the number of DNS records that are transferred to the DNS server in the branch office. What should you do?()A Configure a secondary zone on the DNS server in the branch office.B Configure a stub zone on the DNS server in the branch officeC Configure a stub zone on the DNS server in the main office.D Configure a primary zone on the DNS server in the branch office.