以下哪一种参数是设置非Windows集成安全下的数据库连接()。A、Trusted_Connection=YesB、use rid=sa;password=111C、Integrated Security=TrueD、Integrated Security=SSPI

题目

以下哪一种参数是设置非Windows集成安全下的数据库连接()。

  • A、Trusted_Connection=Yes
  • B、use  rid=sa;password=111
  • C、Integrated  Security=True
  • D、Integrated  Security=SSPI

相似考题
更多“以下哪一种参数是设置非Windows集成安全下的数据库连接()。A、Trusted_Connection=YesB、use rid=sa;password=111C、Integrated Security=TrueD、Integrated Security=SSPI”相关问题
  • 第1题:

    What are three characteristics that buyers of Cisco Small Business routers typically look for?()

    • A、 basic security options
    • B、 simple network configuration
    • C、 advanced network configuration
    • D、 integrated solutions
    • E、 advanced security options
    • F、 point products

    正确答案:B,E,F

  • 第2题:

    以下关于连接字符串的描述中,正确的是()和()。

    • A、Data Source属性表示数据库的类型
    • B、Trusted_Connection参数决定连接是否使用信任连接
    • C、Integrated Security参数决定连接是否使用信任连接
    • D、Initial Catalog表示数据库的类型

    正确答案:B,C

  • 第3题:

    Which security-enabled device is recommended to provide a site-to-site IPsec VPN solution, but not SSL?()

    • A、 Cisco Integrated Service Routers
    • B、 Cisco ASA 5500 Series Security Appliance
    • C、 CiscoWebVPN Services Module
    • D、 CiscoIPsec VPN Module

    正确答案:A

  • 第4题:

    An integrated, converged network enables customers to accomplish which three actions?()

    • A、 simplify communications
    • B、 eliminate network security threats
    • C、 reduce total cost of ownership
    • D、 reduce headcount
    • E、 enable collaboration
    • F、 increase bandwidth

    正确答案:A,C,E

  • 第5题:

    Your company uses Windows Update to download and install security updates on client computers. When Microsoft releases a security update, you have the following requirements:   Establish which client computers require the security update.   Identify what changes will occur as a result of the security update.  Identify which applications might be affected by the security update.    You need to select the appropriate tool to detect application-compatibility issues.   What should you do?()

    • A、Use the Inventory Collector.
    • B、Use the Setup Analysis Tool.
    • C、Use the Update Compatibility Evaluator.
    • D、Use the Windows Compatibility Evaluator.

    正确答案:C

  • 第6题:

    You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()

    • A、Use the security configuration and analysis console to improve the HISECWS security  template file.
    • B、Use the local computer policy to disable the access this computer from the network option.
    • C、Use SECEDIT to reconfigure the computer default security settings to not allow anonymous  access to the computer.
    • D、Create a policy that excludes write access to the windows 2000 computers then apply the  policy to all non-windows 2000 computers.
    • E、None of the above, Windows 9X systems cannot be secured using security template files.

    正确答案:E

  • 第7题:

    You work as an application developer at Contoso.com. You use Microsoft .NET Framework 3.5 and Microsoft ADO.NET to develop an application that will connect to the Microsoft SQL Server 2005 database. You want to use Windows Authentication along with the Microsoft OLE DB provider. You now need to make sure that the OLE DB connection is as secure as possible.   What should you do?()

    • A、 Add the following parameter to the connection string: Integrated Security=true; PersistSecurityInfo=true;
    • B、 Add the following parameter to the connection string: Integrated Security=SSPI;
    • C、 Add the following parameter to the connection string: Integrated Security=SSPI; PersistSecurityInfo=yes;
    • D、 Add the following parameter to the connection string: Integrated Security=true;

    正确答案:B

  • 第8题:

    You are creating a Web application that will run on an intranet. The Web application reads comma-delimited text files. The text files reside in a subdirectory below the Web application's root directory. Users must not be able to navigate directly to these files in a Web browser unless they are members of the Accounting role. You need to write an ASP.NET HTTP handler that will use the FileAuthorizationModule class. Which form of authentication should you use?()

    • A、 Anonymous
    • B、 Certificate
    • C、 Forms
    • D、Microsoft Windows Integrated Security

    正确答案:D

  • 第9题:

    单选题
    Which security-enabled device is recommended to provide a site-to-site IPsec VPN solution, but not SSL?()
    A

     Cisco Integrated Service Routers

    B

     Cisco ASA 5500 Series Security Appliance

    C

     CiscoWebVPN Services Module

    D

     CiscoIPsec VPN Module


    正确答案: B
    解析: 暂无解析

  • 第10题:

    多选题
    List three benefits of implementing an integrated security solution based on the Cisco Self- Defending Network strategy? (Choose three.)()
    A

    integrated security

    B

    collaborative security system

    C

    self provisioning

    D

    Adaptive Threat Defense

    E

    programmable security ASICs

    F

    Cisco lOS-based security


    正确答案: E,F
    解析: 暂无解析

  • 第11题:

    多选题
    An integrated, converged network enables customers to accomplish which three actions?()
    A

    simplify communications

    B

    eliminate network security threats

    C

    reduce total cost of ownership

    D

    reduce headcount

    E

    enable collaboration

    F

    increase bandwidth


    正确答案: E,F
    解析: 暂无解析

  • 第12题:

    多选题
    What are three advantages of the Cisco Integrated Services Pouter product family? (Choose three.) ()
    A

    provides advanced security such as hardware encryption acceleration

    B

    provides investment protection through increased modularity

    C

    comes equipped with at least one 1000-based TX interlace

    D

    contains integrated wireless access using the 802.11 g/b standard

    E

    contains integrated web-based management tools for easy configuration and maintenance


    正确答案: E,D
    解析: 暂无解析

  • 第13题:

    List three benefits of implementing an integrated security solution based on the Cisco Self- Defending Network strategy? (Choose three.)()

    • A、 integrated security
    • B、 collaborative security system
    • C、 self provisioning
    • D、 Adaptive Threat Defense
    • E、 programmable security ASICs
    • F、 Cisco lOS-based security

    正确答案:A,B,D

  • 第14题:

    You are meeting with a customer who is concerned about improving employee productivity. Whatare two ways that you should position the Cisco SDN with this customer?()

    • A、 A Cisco Integrated Security Solution uses the Cisco UN to form a layered and integratednetwork of protection that enables the enforcement of security policies throughout theinfrastructure.
    • B、 A Cisco Integrated Security Solution provides software tools that allow customers to centrallymanage their network security policies.
    • C、 in contrast to point products, the Cisco SDN is a system of defense that leverages the ubiquitous sensing and control capabilities of the network. Each part communicates with the otherto strengthen protection across the entire infrastructure.
    • D、 A Cisco Integrated Security Solution enables barriers that serve as both physical and virtualprotection against possible threats. Security barriers include firewalls, authentication products,access control products, and tunneling and encryption techniques.

    正确答案:B,C

  • 第15题:

    Which of these is a benefit of an integrated security management system?  ()

    • A、 It provides configuration, monitoring, and troubleshooting capabilities across a wide range of security products.
    • B、 It integrates security device management products and collects events on an "as needed" basis to reduce management overhead.
    • C、 It integrates security management capabilities into the router or switch.
    • D、 It provides a single point of contact for all security configuration tasks thereby enhancing the return on investment.
    • E、 It leverages existing network management systems such as HP OpenView to lower the cost of implementation.

    正确答案:A

  • 第16题:

    You have an Exchange 2010 organization.  Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication.  You need to recommend a solution to meet the security policy requirements.  Which two possible ways to achieve this goal should you recommend?()

    • A、Require certificate-based authentication for all Internet-facing Client Access servers.
    • B、Require Windows Integrated Authentication for all Internet-facing Client Access servers.
    • C、Deploy an Edge Transport server, and then disable Windows Integrated Authentication.
    • D、Deploy a server that runs Microsoft Internet Security and Acceleration (ISA) Server, and then enable Kerberos constrained delegation.

    正确答案:A,D

  • 第17题:

    You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT.  You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()

    • A、Use Security Configuration and Analysis to import the Hisecws.inf security template file to modify the default security settings.
    • B、Use security templates to create a security template file and import the security settings to modify the default security settings.
    • C、Use the local computer policy to disable the access to this computer from the network option.
    • D、Use Secedit.exe to reconfigure the computers’ default security settings to not allow anonymous access to the computers.

    正确答案:A

  • 第18题:

    You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()

    • A、Use Security Templates to correct the setting and export the security file.
    • B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.
    • C、Use Secedit /RefreshPolicy Machine_Policy command.
    • D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

    正确答案:C

  • 第19题:

    You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()

    • A、Use secedit.exe to refresh the security policy.
    • B、Use the local computer policy to configure the local security policy.
    • C、Use security configuration and analysis to support the security files as a .pol file.
    • D、Use computer management to configure the security policy setting.

    正确答案:B

  • 第20题:

    单选题
    Which integrated security feature is not provided by the Cisco Business Ready Teleworker solution?()
    A

    Stateful Inspection Firewall

    B

    Intrusion Detection System

    C

    Spam Filtering 

    D

    802.1-based Authentication

    E

    Proxy Authentication

    F

    URL Filtering


    正确答案: F
    解析: 暂无解析

  • 第21题:

    单选题
    Which of these is a benefit of an integrated security management system?  ()
    A

     It provides configuration, monitoring, and troubleshooting capabilities across a wide range of security products.

    B

     It integrates security device management products and collects events on an as needed basis to reduce management overhead.

    C

     It integrates security management capabilities into the router or switch.

    D

     It provides a single point of contact for all security configuration tasks thereby enhancing the return on investment.

    E

     It leverages existing network management systems such as HP OpenView to lower the cost of implementation.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You are the administrator of a Microsoft Windows Server 2003 computer named SQL1. SQL1 runs SQL Server 2005 and is a member of a Microsoft Active Directory domain named Contoso.com. The domain is configured with all of the default settings. Several members of the information security team have requested access to SQL1. The information security team uses the Microsoft Windows XP Professional, Linux, and Macintosh operating systems to perform vulnerability assessments. The information security team members ask you to create two new logon accounts for their use. They would like the logon accounts to have the following user names and passwords: User name/password for first account: pentest/P@ssw0rdUser name/password for second account: hacktest/password You need to provide the information security team with the requested access to SQL1.  Which Transact-SQL script should you use?()
    A

    CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'

    B

    CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password',CHECK_POLICY = OFF

    C

    CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'[HASHED]

    D

    CREATE LOGIN [CONTOSO/pentest]FROM WINDOWS CREATE LOGIN [CONTOSO/hacktest]FROM WINDOWS 


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    以下哪一种参数是设置非Windows集成安全下的数据库连接()。
    A

    Trusted_Connection=Yes

    B

    use  rid=sa;password=111

    C

    Integrated  Security=True

    D

    Integrated  Security=SSPI


    正确答案: B
    解析: 暂无解析