It is a list of remote database links stored in the XML file that are available to the users of the database.
It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.
第1题:
You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()
第2题:
ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()
第3题:
When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
第4题:
You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()
第5题:
You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()
第6题:
Your network contains an Active Directory forest. The forest contains a single domain. You want to access resources in a domain that is located in another forest. You need to configure a trust between the domain in your forest and the domain in the other forest. What should you create()
第7题:
You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()
第8题:
You use Microsoft .NET Framework 4 to create a Windows Presentation Framework (WPF) application. You plan to create a custom control that contains four text input fields. Each of the text input fields within the control will contain a label. You need to ensure that the text input fields within the control can be validated by using a regular expression validator. Which class should you inherit from?()
第9题:
TextBox
TextElement
UIElement
UserControl
第10题:
permit access-list 101 out
ip access-group 101 out
apply access-list 101 out
access-class 101 out
ip access-list e0 out
第11题:
an incoming external trust
an incoming realm trust
an outgoing external trust
an outgoing realm trust
第12题:
You will need to open the database with the resetlogs command.
All you need to do is execute the trace file from SQL*Plus and it will perform the recovery for you.
You will use the resetlogs version of the create controlfile command.
You will use the noresetlogs version of the create controlfile command.
You will use the trace file to create a backup control file, and then you will recover the database with the recover database using backup controlfile command
第13题:
You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()
第14题:
Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()
第15题:
You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()
第16题:
Evaluate the following block of code: BEGIN DBMS_NETWORK_ACL_ADMIN.CREATE_ACL ( acl => ’mycompany-com-permissions.xml’, principal => ’ACCT_MGR’, is_grant => TRUE, privilege => ’connect’); DBMS_NETWORK_ACL_ADMIN.ASSIGN_ACL ( acl => ’mycompany-com-permissions.xml’, host => ’*.mycompany.com’); END; What is the outcome of the above code?()
第17题:
You have lost all your database control files. To recover them, you are going to use the results of the alter database backup controlfile to trace command. Your datafiles and your online redo logs are all intact. Which of the following is true regarding your recovery?()
第18题:
Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()
第19题:
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
第20题:
The ACL applied to the vty lines has no in or out option like ACL being applied to an interface.
The ACL is applied to the Telnet port with the ip access-group command.
The ACL must be applied to each vty line individually.
The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.
第21题:
show access-list
show ip access-list
show ip interface
show interface
show interface list
第22题:
It produces an error because a fully qualified host name needs to be specified.
It produces an error because the range of ports associated with the hosts has not been specified.
It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT and RESOLVE privileges.
It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT privilege but not the RESOLVE privilege.
第23题:
It is a list of remote database links stored in the XML file that are available to the users of the database.
It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.