单选题You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you

题目
单选题
You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()
A

Delete the default auth table mapping policy

B

Create auth table mapping policies that route users to specific resources

C

Create Resource Access policies that permit access to specific resources

D

Create Source Interface policies that route users to specific resources


相似考题
更多“单选题You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you”相关问题
  • 第1题:

    You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()

    • A、Delete the default auth table mapping policy
    • B、Create auth table mapping policies that route users to specific resources
    • C、Create Resource Access policies that permit access to specific resources
    • D、Create Source Interface policies that route users to specific resources

    正确答案:A

  • 第2题:

    You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()

    • A、Dynamic auth table mapping is not enabled.
    • B、A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.
    • C、To create a static auth table mapping, you must delete the default policy.
    • D、The default policy applies only to the factory-default role User.

    正确答案:A

  • 第3题:

    In which scenario will you use the Flashback Transaction Query feature?()

    • A、 when you want to restore an important table that is dropped from the Recycle Bin
    • B、 when you want to obtain the SQL statements to undo the deletion of some important records from a table by a transaction
    • C、when you want to restore a dropped user’s schema
    • D、 when a row of a table is updated many times within a specific time period and you want all the versions of the row in the specified time period

    正确答案:B

  • 第4题:

    When shrinking a table segment, you choose to shrink all the indexes for that table using the SHRINK SPACE command. Which clause should you use?()

    • A、 INCLUDING DEPENDENCIES
    • B、 INCLUDING DEPENDENCIES CASCADE
    • C、 COMPACT
    • D、 CASCADE
    • E、 None of the above

    正确答案:D

  • 第5题:

    You have an Exchange Server 2010 organization.  All users access their mailboxes by using Outlook Web App (OWA).  You need to plan a solution to reduce the number of e-mail messages that are accidentally sent todistribution groups that contain company executives.  What should you include in the plan?()

    • A、custom MailTips
    • B、dynamic distribution groups
    • C、Outlook Protection Rules
    • D、sharing policies

    正确答案:A

  • 第6题:

    You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows 2003 Server. All client computers run Windows XP Professional.    All computers are configured to use Automatic Updates to install updates without user intervention. Updates are scheduled to occur during o peak hours. During a security audit,you notice some client computers are not receiving updates on a regular basis. You verify that Automatic Updates is running on All client computers, and you verify that users cannot modify the Automatic Updates settings.    You need to ensure that computers on your network receive all updates.  What should you do?()

    • A、 Enable the No auto-restart for scheduled Automatic Updates installations setting.
    • B、 Disable the Specify intranet Microsoft update service location setting.
    • C、 Enable the Remove access to use all Windows Update features setting.
    • D、 Enable the Reschedule Automatic Updates scheduled installations setting.

    正确答案:D

  • 第7题:

    单选题
    You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()
    A

    functions

    B

    packages

    C

    procedures

    D

    database triggers

    E

    anonymous PL/SQL block


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    In which scenario do you use the Flashback Database feature?()
    A

     when a table is dropped and you restore it from the Recycle Bin

    B

     when a user’s schema is dropped and you recover the user’s schema

    C

     when some incorrect data is inserted in the table and you retrieve the table to a state that was at a certain timestamp

    D

     when a row of a table is updated frequently and committed, and you view all the versions of the row within a specific duration


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    You work with a database named DB1, which is located on a SQL Server 2005 computer. You discover that a table scan on Table1 in DB1 causes a slow query. Table1 is a very large table that is used frequently. You ascertain that the query contains the following statement. SELECT col1, col2 FROM table1 WHERE col3 =  You need to provide maximum query performance. Table1 must remain available to users. What should you do?()
    A

    Update all statistics on Table1 in DB1.

    B

    Use the CREATE STATISTICS statement in DB1 to create missing statistics on col3of Table1.

    C

    Set the priority boost server option to 1.

    D

    Execute the following statement.USE DB1GOCREATE INDEX index1 ON table1(col3)INCLUDE(col1, col2) WITH (ONLINE = ON)GO


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()
    A

    Dynamic auth table mapping is not enabled.

    B

    A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.

    C

    To create a static auth table mapping, you must delete the default policy.

    D

    The default policy applies only to the factory-default role User.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()
    A

    Delete the default auth table mapping policy

    B

    Create auth table mapping policies that route users to specific resources

    C

    Create Resource Access policies that permit access to specific resources

    D

    Create Source Interface policies that route users to specific resources


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database which is named Sellings in the instance. The Sellings database contains a table named Productions. The table is used to stores information about all types of products. The Productions table is often queried by users on the basis of the RadioSize column. The RadioSize column contains the NULL value for all products other than Radios. Currently no index exists on the RadionSize column. According to the requirement of the company CIO, you have to optimize the query performance and reduce the effect on the disk space to the least. So what action should you perform to achieve this goal?()
    A

    On the Products table, you should create a view. 

    B

    On the RadioSize column, you should create a clustered index 

    C

    On the RadioSize column, you should create a filtered index 

    D

    On the RadioSize column, you should create a unique clustered index


    正确答案: A
    解析: 暂无解析

  • 第13题:

    A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()

    • A、Connection Requests
    • B、System Errors
    • C、Enforcer Events
    • D、Enforcer Command Trace

    正确答案:C,D

  • 第14题:

    In which scenario do you use the Flashback Database feature?()

    • A、 when a table is dropped and you restore it from the Recycle Bin
    • B、 when a user’s schema is dropped and you recover the user’s schema
    • C、 when some incorrect data is inserted in the table and you retrieve the table to a state that was at a certain timestamp
    • D、 when a row of a table is updated frequently and committed, and you view all the versions of the row within a specific duration

    正确答案:B

  • 第15题:

    Which describes the default behavior when you create a table?()

    • A、The table is accessible to all users.
    • B、Tables are created in the public schema.
    • C、Tables are created in your schema.
    • D、Tables are created in the DBA schema.
    • E、You must specify the schema when the table is created.

    正确答案:C

  • 第16题:

    You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()

    • A、functions
    • B、packages
    • C、procedures
    • D、database triggers
    • E、anonymous PL/SQL block

    正确答案:D

  • 第17题:

    TestKing.com uses SQL Server 2005. Users report that report execution is slow. You investigate and discover that some queries do not use optimal execution plans. You also notice that some optimizer statistics are missing and others are out of date.  You need to correct the problem so that reports execute more quickly. Which two Transact-SQL statements should you use?()

    • A、DBCC CHECKTABLE
    • B、ALTER INDEX REORGANIZE
    • C、UPDATE STATISTICS
    • D、CREATE STATISTICS
    • E、DBCC SHOW STATISTICS
    • F、DBCC UPDATEUSAGE

    正确答案:C,D

  • 第18题:

    You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database which is named Sellings in the instance. The Sellings database contains a table named Productions. The table is used to stores information about all types of products. The Productions table is often queried by users on the basis of the RadioSize column. The RadioSize column contains the NULL value for all products other than Radios. Currently no index exists on the RadionSize column. According to the requirement of the company CIO, you have to optimize the query performance and reduce the effect on the disk space to the least. So what action should you perform to achieve this goal?()  

    • A、On the Products table, you should create a view. 
    • B、On the RadioSize column, you should create a clustered index 
    • C、On the RadioSize column, you should create a filtered index 
    • D、On the RadioSize column, you should create a unique clustered index

    正确答案:C

  • 第19题:

    单选题
    In which scenario will you use the Flashback Transaction Query feature?()
    A

     when you want to restore an important table that is dropped from the Recycle Bin

    B

     when you want to obtain the SQL statements to undo the deletion of some important records from a table by a transaction

    C

    when you want to restore a dropped user’s schema

    D

     when a row of a table is updated many times within a specific time period and you want all the versions of the row in the specified time period


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows 2003 Server. All client computers run Windows XP Professional.    All computers are configured to use Automatic Updates to install updates without user intervention. Updates are scheduled to occur during o peak hours. During a security audit,you notice some client computers are not receiving updates on a regular basis. You verify that Automatic Updates is running on All client computers, and you verify that users cannot modify the Automatic Updates settings.    You need to ensure that computers on your network receive all updates.  What should you do?()
    A

     Enable the No auto-restart for scheduled Automatic Updates installations setting.

    B

     Disable the Specify intranet Microsoft update service location setting.

    C

     Enable the Remove access to use all Windows Update features setting.

    D

     Enable the Reschedule Automatic Updates scheduled installations setting.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    You have an Exchange Server 2010 organization.  All users access their mailboxes by using Outlook Web App (OWA).  You need to plan a solution to reduce the number of e-mail messages that are accidentally sent todistribution groups that contain company executives.  What should you include in the plan?()
    A

    custom MailTips

    B

    dynamic distribution groups

    C

    Outlook Protection Rules

    D

    sharing policies


    正确答案: B
    解析: 暂无解析

  • 第22题:

    多选题
    Your company uses SQL Server 2005. Users report that report execution is slow. You investigate and discover that some queries do not use optimal execution plans. You also notice that some optimizer statistics are missing and others are out of date. You need to correct the problem so that reports execute more quickly. Which two Transact-SQL statements should you use?()
    A

    DBCC CHECKTABLE

    B

    ALTER INDEX REORGANIZE

    C

    UPDATE STATISTICS

    D

    CREATE STATISTICS

    E

    DBCC SHOW_STATISTICS

    F

    DBCC UPDATEUSAGE


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    单选题
    When shrinking a table segment, you choose to shrink all the indexes for that table using the SHRINK SPACE command. Which clause should you use?()
    A

     INCLUDING DEPENDENCIES

    B

     INCLUDING DEPENDENCIES CASCADE

    C

     COMPACT

    D

     CASCADE

    E

     None of the above


    正确答案: C
    解析: 暂无解析