You want to create a role to meet these requirements: 1:The role is to be protected from unauthorized usage. 2:The password of the role is not to be embedded in the application source code or stored in a table. Which method would you use to restrict enabling of such roles()A、Create the role with global authentication.B、Create the role with external authentication.C、Create the role as a secure application role.D、Create the role as a password-protected role.E、Create a role and use Fine-Grained Access Control (FGAC) to secure the role.
You want to create a role to meet these requirements: 1:The role is to be protected from unauthorized usage. 2:The password of the role is not to be embedded in the application source code or stored in a table. Which method would you use to restrict enabling of such roles()
- A、Create the role with global authentication.
- B、Create the role with external authentication.
- C、Create the role as a secure application role.
- D、Create the role as a password-protected role.
- E、Create a role and use Fine-Grained Access Control (FGAC) to secure the role.
相关考题:
On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()A. Sign-in PolicyB. Role Mapping RuleC. Role RestrictionsD. Trusted Server CA
You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? () A. user nameB. password lengthC. certificateD. Host Checker
You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.You want to minimize changes to your security model and to your database applications. How should you modify the database?A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.
You are evaluating a Windows Azure application. The application uses one instance of a web role. The role instance size is set to Medium. The application does not use SQL Azure. You have the following requirements for scaling the application: - Maximize throughput. - Minimize downtime while scaling. - Increase system resources. You need to recommend an approach for scaling the application. What should you recommend?() A、 Set up vertical partitioning.B、 Set up horizontal partitioning.C、 Increase the number of role instances.D、 Change the role instance size to large.
You are developing an application that uses role-based security. The prinicipal policy of the application domain is configured during startup with the following code:AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal); You need to restrict access to one of the methods in your application so that only members of the local Administrators group can call the method. Which attribute should you place on the method?()A、 [PrincipalPermission (SecurityAction.Demand, Name = @"BUILTIN/Administrators")]B、 [PrincipalPermission (SecurityAction.Demand, Role = @"BUILTIN/Administrators")]C、 [PrincipalPermission (SecurityAction.Assert, Name = @"BUILTIN/Administrators")]D、 [PrincipalPermission (SecurityAction.Assert, Role = @"BUILTIN/Administrators")]
You have the following requirements: - Ensure that the business tier can be updated without affecting the application tier. - Use the minimum role instance size that meets or exceeds the current server specifications. You need to recommend a topology for hosting the application in Windows Azure. What should you recommend?()A、 Deploy the application tier and the business tier to one role with two Medium instances.B、 Deploy the application tier and the business tier to one role with two Large instances.C、 Deploy the application tier role to a Medium instance. Deploy the business tier role to a medium instance.D、 Deploy the application tier role to a Large instance. Deploy the business tier role to a Large instance.
On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()A、Sign-in PolicyB、Role Mapping RuleC、Role RestrictionsD、Trusted Server CA
You work as an application developer at Contoso.com. You use Microsoft .NET Framework 3.5 and Microsoft ADO.NET to develop an application. The user name and password that is kept by the connection string is stored directly in the code of the application. You want to make sure that the password in the connection string is as protected. What should you do? ()A、 Add the connection string to the Settings.settings file.B、 Add connection string to the Web.config file and use protected configuration.C、 Use the TRUE setting in the Persist Security Info keyword.D、 Use the FALSE setting in the Persist Security Info keyword
You are designing a Windows Azure application. The application includes two web roles and three instances of a worker role. The web roles will send requests to the worker role through one or more Windows Azure Queues. You have the following requirements: - Ensure that each request is processed exactly one time. - Minimize the idle time of each worker role instance. - Maximize the reliability of request processing. You need to recommend a queue design for sending requests to the worker role. What should you recommend?()A、 Create a single queue. Send requests on the single queue.B、 Create a queue for each web role. Send requests on all queues at the same time.C、 Create a queue for each workerrole instance. Send requests on each worker queue in a round robin.D、 Create a queue for each combination of web roles and worker role instances. Send requests to all worker role instances based on the sending web role.
You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()A、user nameB、password lengthC、certificateD、Host Checker
You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()A、Create the role with external authentication.B、Create the role as a secure application role.C、Create the role as a password-protected role.D、Create a role and use Fine-Grained Access Control (FGAC) to secure the role
You have been asked to create three users, PUB1, PUB2 and PUB3, for three newly hired employees and to allocate unlimited quota on their default tablespace PUBLISHER_TBS with no other privileges. After creating the users, which method can you use for granting the required privileges?()A、grant CONNECT role to all of the three usersB、grant RESOURCE role to all of the three usersC、grant both CONNECT and RESOURCE role to all of the three usersD、execute ALTER USER .. QUOTA UNLIMITED ON publisher_tbs command for all of the three usersE、create role with UNLIMITED TABLESPACE system privilege and assign the role to all of the three users
Examine the code: CREATE ROLE readonly IDENTIFIES USING app.chk_readwrite ; CREATE ROLE readwrite IDENTIFIED USING app.chk_readwrite ; CREATE OR REPLACE PROCEDURE app.chk_readwrite AUTHID CURRENT_USER IS ipchk STRING(30); BEGIN IF sys_context(‘USERENV’,’ISDBA’)=’TRUE’ THEN DBMS_SESSION.SET_ROLE‘READWRITE’) ; ELSE DBMS_SESSION.SET_ROLE(‘READONLY’) ; END; / Which three statements correctly describe the Secure Application role definition?()A、No user or application has to remember or hide a password. B、It prevents everyone except a true DBA session from acquiring the READWRITE role. C、app.chk_readwrite is called whenever a user tries to access rows protected by the READONLY or READWRITE label. D、app.chk_readwrite is called by users or applications when they want to enable the READONLY or READWRITE role.
You are designing a Windows Azure web application that does not use ASP.NET. The application requires a standalone Win32 interpreter. You need to recommend an approach for allowing access to the interpreter. What should you recommend?()A、 Use a web role. Configure the interpreter as an ISAPI filter.B、 Use a web role. Configure a FastCGI handler for the interpreter and set the path to the interpreter.C、 Use a worker role with an internal endpoint. Enable native code execution.D、 Use a worker role with an external endpoint. Configure a FastCGI handler for the interpreter and set the path to the root.
You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()A、Los AngelesB、ParisC、SydneyD、LisbonE、Barcelona
You are adatabase developer. You develop atask management application that connect stoa SQLServer 2008 database named TaskDB.Users logon to the application by using a SQLServer login. The application contains amodule named Task that assigns tasks tousers. Information about the setasks is stored in the Tasks table of the TaskDB data base. The Tasks table contains multiple columns. These include the Close Dateand Estimated Timecolumns. The application must meet the following security requirements: Users assigned toad atabase role named User 1 canupd ate all task information columns except the Close Date and the Estimated Time columns in the Tasks table. Administrative users assigned toad atabase role named Task_Admin canupd ateall task information in the Tasks table.You needto design a strategy to meet the security requirements. Which two actions should you perform?()A、Add the Task_Admin role to thedb_accessadmin fixed database role.B、Grant Update permissions on the Tasks table to the Task_Admin role.C、Grant Update permissions on the Tasks table to the User 1 role foreach column except the Close Dateand Estimated Time columns.D、Createan INSTEAD OF trigger on the Tasks Table. Use theIs_Member function toprevent the User 1 role from updating the Close Date and Estimated Time columns.
You need to design the database permissions for access from the terminals to the database server. Which action or actions should you perform?()A、Create a database role named BankTerminals.B、Grant the BankTerminals role the Execute permission for the WoodgroveBanking database.C、Grant database access to the Windows Bank Terminals group, and add the group to the BankTerminals role.D、Grant the BankTerminals role the Execute permission for the Bank schema.E、Grant the Windows Bank Terminals group the Execute permission for the Bank schema.F、Grant the BankTerminals role the Execute permission for all stored procedures and user-defined functions in the Bank schema.
单选题You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()ACreate the role with external authentication.BCreate the role as a secure application role.CCreate the role as a password-protected role.DCreate a role and use Fine-Grained Access Control (FGAC) to secure the role
单选题You work as an application developer at Contoso.com. You use Microsoft .NET Framework 3.5 and Microsoft ADO.NET to develop an application. The user name and password that is kept by the connection string is stored directly in the code of the application. You want to make sure that the password in the connection string is as protected. What should you do? ()A Add the connection string to the Settings.settings file.B Add connection string to the Web.config file and use protected configuration.C Use the TRUE setting in the Persist Security Info keyword.D Use the FALSE setting in the Persist Security Info keyword
单选题You need to base a data block on the EMP table, but you do not want to give the users of the application access privileges on the table. Which type of data source would you use to create the data block?()Atable Btransactional trigger Cstored procedure DFROM clause query
多选题You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()Auser nameBpassword lengthCcertificateDHost Checker
单选题You are evaluating a Windows Azure application. The application uses one instance of a web role. The role instance size is set to Medium. The application does not use SQL Azure. You have the following requirements for scaling the application: - Maximize throughput. - Minimize downtime while scaling. - Increase system resources. You need to recommend an approach for scaling the application. What should you recommend?()A Set up vertical partitioning.B Set up horizontal partitioning.C Increase the number of role instances.D Change the role instance size to large.
单选题You have been asked to create three users, PUB1, PUB2 and PUB3, for three newly hired employees and to allocate unlimited quota on their default tablespace PUBLISHER_TBS with no other privileges. After creating the users, which method can you use for granting the required privileges?()Agrant CONNECT role to all of the three usersBgrant RESOURCE role to all of the three usersCgrant both CONNECT and RESOURCE role to all of the three usersDexecute ALTER USER .. QUOTA UNLIMITED ON publisher_tbs command for all of the three usersEcreate role with UNLIMITED TABLESPACE system privilege and assign the role to all of the three users
单选题You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()ALos AngelesBParisCSydneyDLisbonEBarcelona
单选题You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()ACreate the role with external authentication.BCreate the role as a secure application role.CCreate the role as a password-protected role.DCreate a role and use Fine-Grained Access Control (FGAC) to secure the role
单选题You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()A Los AngelesB ParisC SydneyD LisbonE Barcelona
单选题You want to create a role to meet these requirements: 1:The role is to be protected from unauthorized usage. 2:The password of the role is not to be embedded in the application source code or stored in a table. Which method would you use to restrict enabling of such roles()ACreate the role with global authentication.BCreate the role with external authentication.CCreate the role as a secure application role.DCreate the role as a password-protected role.ECreate a role and use Fine-Grained Access Control (FGAC) to secure the role.