When adding a new user and assigning a role, which user role has "read only" rights to theconfiguration and operational states? ()
第1题:
A. user name
B. password length
C. certificate
D. Host Checker
第2题:
A.user
B.read_only
C.target_operator
D.security_operator
第3题:
Which three statements describe user authentication in Cisco DCNM-LAN? ()
第4题:
A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()
第5题:
From the DX WebUI Dashboard, which steps are used for creating a new admin user? ()
第6题:
You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()
第7题:
The DBA is defining role for users. Which of the following is not an acceptable method for defining a default role?()
第8题:
Which two statements accurately describe a role?()
第9题:
You create a Web site that is for members only. The behavior of the Web site changes according to the role of the user. The Web site uses the ASP.NET Membership control for creation of user accounts. You need to find out whether a user is a member of a particular role. What should you do?()
第10题:
port-profile
command
access-list
feature-group
OID
第11题:
Data is redacted for the EMP.SAL column only if the SCOTT session does not have the MGR role set.
Data is redacted for EMP.SAL column only if the SCOTT session has the MGR role set.
Data is never redacted for the EMP_V.SAL column.
Data is redacted for the EMP_V.SAL column only if the SCOTT session has the MGR role set.
Data is redacted for the EMP_V.SAL column only if the SCOTT session does not have the MGR role set.
第12题:
The user copied to a read-only folder share.
The user changed the attributes of the files.
The user copied the files from the local My Documents folder.
The user moved instead of copied the files.
第13题:
A. Click Admin > Users. Enter username, password, role, account status, and email.
B. Click Admin > Users. Enter username, password, role, account status, and user class.
C. Click Users > Manage Users. Enter username, password, role, account status, and user class.
D. Click Users > Manage Users. Enter username, password, ActiveDirectory domain, account status, and role.
第14题:
A. Dynamic auth table mapping is not enabled.
B. A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.
C. To create a static auth table mapping, you must delete the default policy.
D. The default policy applies only to the factory-default role User.
第15题:
Which attribute is used to pass the user role back to the Nexus when remote AAA is enabled?()
第16题:
A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()
第17题:
You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()
第18题:
View the Exhibit to observe the roles assigned to the SL_REP user. Which statement is true about theassignment of the SELECT_CATALOG_ROLE role to the SL_REP user()
第19题:
You execute the following piece of code with appropriate privileges: User SCOTT has been granted theCREATE SESSION privilege and the MGR role.Which two statements are true when a session logged in as SCOTT queries the SAL column in the viewand the table?()
第20题:
Examine the code: CREATE ROLE readonly IDENTIFIES USING app.chk_readwrite ; CREATE ROLE readwrite IDENTIFIED USING app.chk_readwrite ; CREATE OR REPLACE PROCEDURE app.chk_readwrite AUTHID CURRENT_USER IS ipchk STRING(30); BEGIN IF sys_context(‘USERENV’,’ISDBA’)=’TRUE’ THEN DBMS_SESSION.SET_ROLE‘READWRITE’) ; ELSE DBMS_SESSION.SET_ROLE(‘READONLY’) ; END; / Which three statements correctly describe the Secure Application role definition?()
第21题:
user
read_only
target_operator
security_operator
第22题:
The user must enable the role explicitly.
The user can grant the role to other users.
The user cannot use the role until the DBA enables it explicitly.
The user can start using the role immediately without any changes
第23题:
The user SKD can grant only the MGR_ROLE role to other users, but not the privileges in it.
The user SKD can revoke the MGR_ROLE only from the users for whom he/she is the grantor.
The user SKD can grant the privileges in the MGR_ROLE role to other users, but not with ADMIN OPTION.
The user SKD can grant the privileges in the MGR_ROLE role to other users, but cannot revoke privilegesfrom them