You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A、All users except SYSB、All users except SCOTTC、All users except sys and SCOTTD、All users except sys, system, and SCOTT

You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()

  • A、All users except SYS
  • B、All users except SCOTT
  • C、All users except sys and SCOTT
  • D、All users except sys, system, and SCOTT

相关考题:

2.I _________to visit Guilin and I_________ you to go with me.A. wish ; hopeB. hope; wishC. hope; wish forD. wish; hope that

I wish () every success in your new post!A、you to haveB、you to achieveC、youD、you have

You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements:SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT;For which database users is the audit policy now active?()A. All users except SYSB. All users except SCOTTC. All users except sys and SCOTTD. All users except sys, system, and SCOTT

Following a competitive tender, your audit firm Cal Co has just gained a new audit client Tirrol Co. You are the manager in charge of planning the audit work. Tirrol Co’s year end is 30 June 2009 with a scheduled date to complete the audit of 15 August 2009. The date now is 3 June 2009.Tirrol Co provides repair services to motor vehicles from 25 different locations. All inventory, sales and purchasing systems are computerised, with each location maintaining its own computer system. The software in each location isthe same because the programs were written specifically for Tirrol Co by a reputable software house. Data from each location is amalgamated on a monthly basis at Tirrol Co’s head office to produce management and financial accounts.You are currently planning your audit approach for Tirrol Co. One option being considered is to re-write Cal Co’s audit software to interrogate the computerised inventory systems in each location of Tirrol Co (except for head office)as part of inventory valuation testing. However, you have also been informed that any computer testing will have to be on a live basis and you are aware that July is a major holiday period for your audit firm.Required:(a) (i) Explain the benefits of using audit software in the audit of Tirrol Co; (4 marks)(ii) Explain the problems that may be encountered in the audit of Tirrol Co and for each problem, explainhow that problem could be overcome. (10 marks)(b) Following a discussion with the management at Tirrol Co you now understand that the internal audit department are prepared to assist with the statutory audit. Specifically, the chief internal auditor is prepared to provide you with documentation on the computerised inventory systems at Tirrol Co. The documentation provides details of the software and shows diagrammatically how transactions are processed through the inventory system. This documentation can be used to significantly decrease the time needed to understand the computer systems and enable audit software to be written for this year’s audit.Required:Explain how you will evaluate the computer systems documentation produced by the internal auditdepartment in order to place reliance on it during your audit. (6 marks)

打开审计开关的操作是什么()。A、ENABLE_AUDIT=0B、ENABLE_ENCRYPT=0C、ENABLE_AUDIT=1D、ENABLE_ENCRYPT=1

Consider the MySQL Enterprise Audit plugin, You add the following lines to the my.cnf configuration tile: [mysqld] Plugin-load=audit_log.so Audit-log=FORCE_PLUS_PERMANENT You attempt to start up the MySQL service and notice that it fails to start. Which two statements would explain why the service did not start?()A、FORCE_PLUS_PERMANENT is not valid for the audit-log optionB、The audit_log.so library does not existC、The audit_log.so library is in a location that is different from that defined by the plugin_dir optionD、The audit plugin must be loaded dynamically by using the INSTALL PLUGIN commandE、The audit log file does not exist in which to write audit eventsF、The audit_log.so library is not an executable file

Your company has file servers located in an organizational unit named Payroll. The file servers contain payroll files located in a folder named Payroll. You create a GPO. You need to track which employees access the Payroll files on the file servers. What should you do()A、Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file servers, configure Auditing for the Everyone group in the Payroll folder.B、Enable the Audit object access option. Link the GPO to the domain. On the domain controllers, configure Auditing for the Authenticated Users group in the Payroll folder.C、Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit. On the file servers, configure Auditing for the Authenticated Users group in the Payroll folder.D、Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file servers, configure Auditing for the Everyone group in the Payroll folder.

A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A、 Enable audit object access and specify files and folders to monitor using Task Manager.B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.D、 Open Performance Monitor and monitor folder activity.

You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.  What should you do?()A、Enable the Problem Reporting feature for all users.B、Configure a custom view to monitor failed logon events on your computer.C、Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.D、In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.

Your company has file servers located in an organizational unit named Payroll. The file servers  contain payroll files located in a folder named Payroll.     You create a GPO. You need to track which employees access the Payroll files on the file  servers.   What should you do()    A、Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file servers, configureB、Enable the Audit object access option. Link the GPO to the domain. On the domain controllers, configure Auditing fC、Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit. On the file seD、Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file servers, config

You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers

You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1.You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses.You need to display mnemonic host names instead of IP addresses for all the frames. What should you do? ()A、Create a new display filter and apply the filter to the capture.B、Create a new capture filter and apply the filter to the capture.C、Populate the Aliases table and apply the aliases to the capture.D、Configure the Network Monitor application to enable the Enable Conversations option. Recapture the data to a new file.

Your network consists of a single Active Directory domain. All domain controllers run Windows  Server 2008 R2.     The Audit account management policy setting and Audit directory services access setting are  enabled for the entire domain.     You need to ensure that changes made to Active Directory objects can be logged. The logged  changes must include the old and new values of any attributes.     What should you do()A、Enable the Audit account management policy in the Default Domain Controller Policy.B、Run auditpol.exe and then configure the Security settings of the Domain Controllers OU.C、Run auditpol.exe and then enable the Audit directory service access setting in the Default Domain policy.D、From the Default Domain Controllers policy, enable the Audit directory service access setting and enable directory

You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged.  What should you do?()A、Start the Problem Steps Recorder.B、From Event Viewer, modify the properties of the Security log.C、From the local Group Policy, configure the Audit object access setting.D、From the local Group Policy, configure the Audit directory service Access setting.

Your company has a server that runs Windows Server 2008. Certification Services is configured as a stand-alone Certification Authority (CA) on the server. You need to audit changes to the CA configuration settings and the CA security settings. Which two tasks should you perform()A、Configure auditing in the Certification Services snap-in.B、Enable auditing of successful and failed attempts to change permissions on files in the %SYSTEM32% /CertSrv directory.C、Enable auditing of successful and failed attempts to write to files in the %SYSTEM32%/CertLog directory.D、Enable the Audit object access setting in the Local Security Policy for the Certification Services server.

Your company has a server that runs Windows Server 2008 R2. Active Directory Certificate Services  (AD CS) is configured as a standalone Certification Authority (CA) on the server. You need to audit changes to the CA configuration settings and the CA security settings. Which two tasks should you perform()A、Configure auditing in the Certification Authority snap-in.B、 Enable  auditing  of  successful  and  failed  attempts  to  change  permissions  on  files  in  the %SYSTEM32%/CertSrv directory.C、Enable auditing of successful and failed attempts to write to files in the %SYSTEM32%/CertLog directory.D、Enable the Audit object access setting in the Local Security Policy for the Active Directory Certificate  Services (AD CS) server.

多选题You work as a database administrator for Certkiller .com. In your development environmentenvironment, the developers are responsible for modifying the table structure according to the application requirements. However, you want to keep track of the ALTER TABLE commands being executed by developers, so you enable auditing to achieve this objective.  Which two views would you refer to find out the audit information?()ADBA_AUDIT_TRAILBDBA_AUDIT_SESSIONCDBA_FGA_AUDIT_TRAILDDBA_COMMON_AUDIT_TRAIL

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 35 Windows Server 2003 computers; 3,000 Windows XP Professional computers; and 2,200 Windows 2000 Professional computers.  The written company security policy states that all computers in the domain must be examined, with the following goals:  (1)to find out whether all available security updates are present   (2)to find out whether shared folders are present  to record the file system type on each hard disk   You need to provide this security assessment of every computer and verify that the requirementsof the written security policy are met.  What should you do?()AOpen the Default Domain Policy and enable the Configure Automatic Updates policy.BOpen the Default Domain Policy and enable the Audit object access policy, the Audit account management policy, and the Audit system events policy.COn a server, install and run mbsacli.exe with the appropriate configuration switches.DOn a server, install and run HFNetChk.exe with the appropriate configuration switches.

单选题If you wish, you ______ come in and have a cup of coffee.AmayBmustCwouldDshould

单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A Enable audit object access and specify files and folders to monitor using Task Manager.B Enable audit policy change and specify files and folders to monitor using Windows Explorer.C Enable audit object access and specify files and folders to monitor using Windows Explorer.D Open Performance Monitor and monitor folder activity.

单选题Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()AIn the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.BIn the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.CIn the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.DIn the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.

单选题You perform a security audit on a server named server1. You install the Microsoft network monitor 3.0 application on server1. You find that only some of the captured frames dsplay host mnemonic names in the source column and the destination column. All other frames display ip addresses. You need to display mnemonic host names instead of ip addresses for all the frames what should you do?()ACreate a new display filter and apply the filter to the capture.BCreate a new capture filter and apply the filter to the capture.CPopulate the aliases table and apply the aliases to the capture.DConfigure the network monitor application to enable the enable converstations option, recapture the data to a new file.

单选题Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 The Audit account management policy setting and Audit directory services access setting are enabled for the entire domain. You need to ensure that changes made to Active Directory objects can be logged. The logged changes must include the old and new values of any attributes What should you do()AEnable the Audit account management policy in the Default Domain Controller Policy.BRun auditpol.exe and then configure the Security settings of the Domain Controllers OU.CRun auditpol.exe and then enable the Audit directory service access setting in the Default Domain policy.DFrom the Default Domain Controllers policy, enable the Audit directory service access setting andEnable directory service changes.

单选题Your network consists of a single Active Directory domain. All domain controllers run Windows  Server 2008 R2.     The Audit account management policy setting and Audit directory services access setting are  enabled for the entire domain.     You need to ensure that changes made to Active Directory objects can be logged. The logged  changes must include the old and new values of any attributes.     What should you do()AEnable the Audit account management policy in the Default Domain Controller Policy.BRun auditpol.exe and then configure the Security settings of the Domain Controllers OU.CRun auditpol.exe and then enable the Audit directory service access setting in the Default Domain policy.DFrom the Default Domain Controllers policy, enable the Audit directory service access setting and enable directory

单选题Consider the MySQL Enterprise Audit plugin. On attempting to start the MySQL service after a crash, notice the following error: [ERROR] Plugin ‘audit_log’ init function returned error. In the audit log file, you notice the final entry: … What action should you take to fix the error and allow the service to start?()A Re-install the audit pluginB Execute the command FLUSH LOGSC Execute the command SET GLOBAL audit_log_fiush= OND Move or rename the existing audit.log file

单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Confidential files are stored on a member server named TK1. The computer object for TK1 resides in an organizational unit (OU) named Confidential. A Group Policy object (GPO) named GPO1 is linked to the Confidential OU. To audit access to the confidential files, you enable auditing on all private folders on TK1. Several days later, you review the audit logs. You discover that auditing is not successful. You need to ensure that auditing occurs successfully. What should you do?()AStart the System Event Notification Service (SENS) on TK1.BStart the Error Reporting service on TK1.CModify the Default Domain Controllers GPO by selecting Success and Failure as the Audit Object Access setting.DModify GPO1 by selecting Success and Failure as the Audit Object Access setting.

单选题You are an administrator at Certkiller .com. Certkiller has a network of 5 member servers acting as file servers. It has an Active Directory domain. You have installed a software application on the servers. As soon as the application is installed, one of the member servers shuts down itself. To trace and rectify the problem, you create a Group Policy Object (GPO). You need to change the domain security settings to trace the shutdowns and identify the cause of it. What should you do to perform this task()ALink the GPO to the domain and enable System Events optionBLink the GPO to the domain and enable Audit Object Access optionCLink the GPO to the Domain Controllers and enable Audit Object Access optionDLink the GPO to the Domain Controllers and enable Audit Process tracking optionEPerform all of the above actions