Delete the default auth table mapping policy
Create auth table mapping policies that route users to specific resources
Create Resource Access policies that permit access to specific resources
Create Source Interface policies that route users to specific resources
第1题:
You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()
第2题:
You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()
第3题:
In which scenario will you use the Flashback Transaction Query feature?()
第4题:
When shrinking a table segment, you choose to shrink all the indexes for that table using the SHRINK SPACE command. Which clause should you use?()
第5题:
You have an Exchange Server 2010 organization. All users access their mailboxes by using Outlook Web App (OWA). You need to plan a solution to reduce the number of e-mail messages that are accidentally sent todistribution groups that contain company executives. What should you include in the plan?()
第6题:
You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows 2003 Server. All client computers run Windows XP Professional. All computers are configured to use Automatic Updates to install updates without user intervention. Updates are scheduled to occur during o peak hours. During a security audit,you notice some client computers are not receiving updates on a regular basis. You verify that Automatic Updates is running on All client computers, and you verify that users cannot modify the Automatic Updates settings. You need to ensure that computers on your network receive all updates. What should you do?()
第7题:
functions
packages
procedures
database triggers
anonymous PL/SQL block
第8题:
when a table is dropped and you restore it from the Recycle Bin
when a user’s schema is dropped and you recover the user’s schema
when some incorrect data is inserted in the table and you retrieve the table to a state that was at a certain timestamp
when a row of a table is updated frequently and committed, and you view all the versions of the row within a specific duration
第9题:
Update all statistics on Table1 in DB1.
Use the CREATE STATISTICS statement in DB1 to create missing statistics on col3of Table1.
Set the priority boost server option to 1.
Execute the following statement.USE DB1GOCREATE INDEX index1 ON table1(col3)INCLUDE(col1, col2) WITH (ONLINE = ON)GO
第10题:
Dynamic auth table mapping is not enabled.
A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.
To create a static auth table mapping, you must delete the default policy.
The default policy applies only to the factory-default role User.
第11题:
Delete the default auth table mapping policy
Create auth table mapping policies that route users to specific resources
Create Resource Access policies that permit access to specific resources
Create Source Interface policies that route users to specific resources
第12题:
On the Products table, you should create a view.
On the RadioSize column, you should create a clustered index
On the RadioSize column, you should create a filtered index
On the RadioSize column, you should create a unique clustered index
第13题:
A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()
第14题:
In which scenario do you use the Flashback Database feature?()
第15题:
Which describes the default behavior when you create a table?()
第16题:
You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()
第17题:
TestKing.com uses SQL Server 2005. Users report that report execution is slow. You investigate and discover that some queries do not use optimal execution plans. You also notice that some optimizer statistics are missing and others are out of date. You need to correct the problem so that reports execute more quickly. Which two Transact-SQL statements should you use?()
第18题:
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database which is named Sellings in the instance. The Sellings database contains a table named Productions. The table is used to stores information about all types of products. The Productions table is often queried by users on the basis of the RadioSize column. The RadioSize column contains the NULL value for all products other than Radios. Currently no index exists on the RadionSize column. According to the requirement of the company CIO, you have to optimize the query performance and reduce the effect on the disk space to the least. So what action should you perform to achieve this goal?()
第19题:
when you want to restore an important table that is dropped from the Recycle Bin
when you want to obtain the SQL statements to undo the deletion of some important records from a table by a transaction
when you want to restore a dropped user’s schema
when a row of a table is updated many times within a specific time period and you want all the versions of the row in the specified time period
第20题:
Enable the No auto-restart for scheduled Automatic Updates installations setting.
Disable the Specify intranet Microsoft update service location setting.
Enable the Remove access to use all Windows Update features setting.
Enable the Reschedule Automatic Updates scheduled installations setting.
第21题:
custom MailTips
dynamic distribution groups
Outlook Protection Rules
sharing policies
第22题:
DBCC CHECKTABLE
ALTER INDEX REORGANIZE
UPDATE STATISTICS
CREATE STATISTICS
DBCC SHOW_STATISTICS
DBCC UPDATEUSAGE
第23题:
INCLUDING DEPENDENCIES
INCLUDING DEPENDENCIES CASCADE
COMPACT
CASCADE
None of the above