单选题You opened the encryption wallet and then issued the following command:   SQLCREATE TABLESPACE securespace DATAFILE ’/home/user/oradata/secure01.dbf’ SIZE 150M  ENCRYPTION USING ’3DES168’ DEFAULT STORAGE(ENCRYPT);   Then you closed the wallet. Later, you issued the following command to create theEMPLOYEES table in the SECURESPACE tablespace and you use the NO SALT option for the EMPID column.  What is the outcome?()A It creates the table and encrypts the data in it.B It generates an error because the wallet is closed.C It creates the table but does not encrypt the data in it.D It generates an error because the NO SALT option cannot be used with the ENCRYPT option.

单选题
You opened the encryption wallet and then issued the following command:   SQL>CREATE TABLESPACE securespace DATAFILE ’/home/user/oradata/secure01.dbf’ SIZE 150M  ENCRYPTION USING ’3DES168’ DEFAULT STORAGE(ENCRYPT);   Then you closed the wallet. Later, you issued the following command to create theEMPLOYEES table in the SECURESPACE tablespace and you use the NO SALT option for the EMPID column.  What is the outcome?()
A

 It creates the table and encrypts the data in it.

B

 It generates an error because the wallet is closed.

C

 It creates the table but does not encrypt the data in it.

D

 It generates an error because the NO SALT option cannot be used with the ENCRYPT option.


参考解析

解析: 暂无解析

相关考题:

I () his face when he opened the letter. A.should like you to seeB.would have liked you to be seenC.should like you to have seenD.would like you to see

What are you doing? I'm _____the bedroom for my wallet. A.lookingB.findingC.searchingD.searching for

--- I can’t find my wallet.--- _____ it at home? A.Must you leaveB.Maybe you leaveD.You might leftD.Might you have left

We request you to see to it that L/C is opened by cable ()order is placed with us.A、whateverB、wheneverC、whereverD、whoever

–What‘s up? – () A.The box is up.B.I lost my wallet.C.It‘s up to you.D.It‘s all right.

Examine the following RMAN command:RMAN CONFIGURE ENCRYPTION FOR DATABASE ON;RMAN BACKUP DATABASE PLUS ARCHIVELOG;Which prerequisite must be met before accomplishing the backup?() A. Provide a password for the encryptionB. Set up an Oracle wallet for the encryptionC. No setup is required as it is a default encryption methodD. Both Oracle wallet and password must be set up for the encryption

You opened the encryption wallet and then issued the following command:Then you closed the wallet. Later, you issued the following command to create the EMPLOYEES table in the SECURESPACE tablespace and you use the NO SALT option for the EMPID column.What is the outcome?()A. It creates the table and encrypts the data in it.B. It generates an error because the wallet is closed.C. It creates the table but does not encrypt the data in it.D. It generates an error because the NO SALT option cannot be used with the ENCRYPT option.

You created an encrypted tablespace:You then closed the encryption wallet because you were advised that this is secure.Later in the day, you attempt to create the EMPLOYEES table in the SECURESPACE tablespace with the SALT option on the EMPLOYEE column.Which is true about the result?()A. It creates the table successfully but does not encrypt any inserted data in the EMPNAME column because the wallet must be opened to encrypt columns with SALT.B. It generates an error when creating the table because the wallet is closed.C. It creates the table successfully, and encrypts any inserted data in the EMPNAME column because the wallet needs to be open only for tablespace creation.D. It generates error when creating the table, because the salt option cannot be used with encrypted tablespaces.

You just issued the following statement: ALTER TABLE SALES DROP COLUMN PROFIT. Which of the following choices identifies when the column will actually be removed from Oracle?()A、Immediately following statement execution B、After the ALTER TABLE DROP UNUSED COLUMNS command is issued C、After the ALTER TABLE SET UNUSED COLUMN command is issued D、After the ALTER TABLE MODIFY command is issued

Examine the following RMAN command:   RMAN CONFIGURE ENCRYPTION FOR DATABASE ON; RMAN BACKUP DATABASE PLUS ARCHIVELOG;   Which prerequisite must be met before accomplishing the backup?()A、 Provide a password for the encryptionB、 Set up an Oracle wallet for the encryptionC、 No setup is required as it is a default encryption methodD、 Both Oracle wallet and password must be set up for the encryption

Which two statements are true about encrypting RMAN backup?()A、 The transparent encryption of backups uses the encryption walletB、 The database uses the same encryption key for every encrypted backupC、 The password encryption of backups only uses the password while creating and restoring backupD、 If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups

our database is in the MOUNT state and you execute the following command to open it:  ALTER DATABASE OPEN  What two actions are performed as a result of this command?()A、All control files are opened.B、All redo log files are openedC、The password file is opened.D、The parameter file is opened.E、All online data files are opened.

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. A database is utilized by the instance, and the database is utilized by a Web-based application. 15,000 transactions are processed by the application every minute. A column is contained by a table in the database, and the column is utilized only by the application. Sensitive data is stored in this column. The sensitive data should be stored with the highest security level. In addition, the least amount of memory space and processor time should be utilized. From the following four encryption types, which one should you utilize?()A、Asymmetric key encryption should be utilized.B、Certificate-based encryption should be utilized.C、Symmetric key encryption should be utilized.D、Transparent data encryption should be utilized.

You need to design a method to enable remote encryption on Server5. What should you do?()A、Configure the editor’s user account properties to enable Store password using reversible encryptionB、Configure the editor’s user account properties to enable Use DES encryption for this accountC、Configure the Local Security Policy on Server to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing security policyD、Configure the Server5 computer account properties to enable Trust computer for delegation

You have an Exchange Server 2010 organization.Users on the network use HTTPS to connect to Outlook Web App (OWA).The Client Access server uses a certificate issued by an internal certification authority (CA).You plan to deploy an e-mail encryption solution for all users. You need to ensure that users can send and receive encrypted e-mail messages by using S/MIME from OWA.What should you do?()A、Issue a certificate to each userB、Instruct all OWA users to import a root CA certificateC、Modify the authentication settings of the OWA virtual directoryD、Configure the Client Access Server to use a certificate issued by a third-party CA

You want to configure your Windows 2000 Professional computer to remotely access your company's Windows 2000 Routing and Remote Access server. You configure a VPN connection. For security purposes, you configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically, to enable IPSec, and to set IPSec to Secure Server.  When you try to connect, you receive the following error message, "The encryption attempt failed because no valid certificate was found."  What should you do to connect to the server? ()A、Enable the VPN connection to use MS-CHAP.B、Change the data encryption setting toOptional Encryption.C、Specify a TCP/IP address in theNetworkproperties.D、Change the IPSec policy setting toClient.

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now in a high security environment, you manage a SQL Server 2008 cluster. You intend to configure and use encrypted connections for the clustered virtual SQL Server. You have to install a certificate. The cetification will be used for encryption. What should you do?()AIn the cluster quorum drive, install the encryption certificate BIn the SQL Server shared disk, install the encryption certificate Cin the cluster group, install the encryption certificate. DOn each individual node, install the encryption certificate

多选题our database is in the MOUNT state and you execute the following command to open it:  ALTER DATABASE OPEN  What two actions are performed as a result of this command?()AAll control files are opened.BAll redo log files are openedCThe password file is opened.DThe parameter file is opened.EAll online data files are opened.

单选题As soon as you hear the fire and emergency signal, you should ensure that the ().Aring buoys are thrown overboardBengines are stoppedCfire pumps are startedDlife preservers have been issued to everyone

单选题Examine the following RMAN command: RMAN CONFIGURE ENCRYPTION FOR DATABASE ON; RMAN BACKUP DATABASE PLUS ARCHIVELOG; Which prerequisite must be met before accomplishing the backup?()AProvide a password for the encryptionBSet up an Oracle wallet for the encryptionCNo setup is required as it is a default encryption methodDBoth Oracle wallet and password must be set up for the encryption

多选题Which two statements are true about encrypting RMAN backup?()AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

单选题You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()AConfigure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain usersBSpecify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail serversCFor each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trustedDRequire IPSec encryption on all TCP connections that are used to send or receive e-mail messages

多选题Which two statements are true about encrypting RMAN backup?()AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups

单选题You need to include a disclaimer to all sent messages in your organization. Some of the users require message encryption.How do you make sure that disclaimer can be included in encrypted messages?()AInstruct the users to use IRM encryption method onlyBInstruct the users to use S/MIME encryption method onlyCUsing command New-ExchangeCertificate cmdletDUsing the Set-ExchangeServer cmdlet

单选题You opened the encryption wallet and then issued the following command:   SQLCREATE TABLESPACE securespace DATAFILE ’/home/user/oradata/secure01.dbf’ SIZE 150M  ENCRYPTION USING ’3DES168’ DEFAULT STORAGE(ENCRYPT);   Then you closed the wallet. Later, you issued the following command to create theEMPLOYEES table in the SECURESPACE tablespace and you use the NO SALT option for the EMPID column.  What is the outcome?()A It creates the table and encrypts the data in it.B It generates an error because the wallet is closed.C It creates the table but does not encrypt the data in it.D It generates an error because the NO SALT option cannot be used with the ENCRYPT option.

多选题Which two statements are true about encrypting RMAN backup?() (Choose two.)AThe transparent encryption of backups uses the encryption walletBThe database uses the same encryption key for every encrypted backupCThe password encryption of backups only uses the password while creating and restoring backupDIf transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

单选题To keep your wallet safe, you’d better ______.Ahold it in your handBleave it in the hotel safeCput it in your front pocketDkeep it in your shoulder bag

单选题You created an encrypted tablespace: You then closed the encryption wallet because you were advised that this is secure. Later in the day, you attempt to create the EMPLOYEES table in the SECURESPACE tablespace with the SALT option on the EMPLOYEE column. Which is true about the result?()AIt creates the table successfully but does not encrypt any inserted data in the EMPNAME column because the wallet must be opened to encrypt columns with SALT.BIt generates an error when creating the table because the wallet is closed.CIt creates the table successfully, and encrypts any inserted data in the EMPNAME column because the wallet needs to be open only for tablespace creation.DIt generates error when creating the table, because the salt option cannot be used with encrypted tablespaces.