单选题As the Certkiller administrator you had installed a read-only domain controller (RODC) server at remote location.  The remote location doesn’t provide enough physical security for the server.  What should you do to allow administrative accounts to repl

题目
单选题
As the Certkiller administrator you had installed a read-only domain controller (RODC) server at remote location.  The remote location doesn’t provide enough physical security for the server.  What should you do to allow administrative accounts to replicate authentication information to Read-Only Domain Controllers()
A

Remove any administrative accounts from RODC’s group

B

Add administrative accounts to the domain Allowed RODC Password Replication group

C

Set the Deny on Receive as permission for administrative accounts on the RODC computer account security tab for the Group Policy Object (GPO)

D

Configure a new Group Policy Object (GPO) with the Account Lockout settings enabled. Link the GPO to the remote location. Activate the Read Allow and the Apply group policy Allow permissions for the administrators on the Security tab for the GPO.

E

None of the above


相似考题
更多“As the Certkiller administrator you had installed a read-onl”相关问题
  • 第1题:

    You work as a database administrator for Certkiller .com. As a result of performance analysis, you created an index on theprod_namecolumn of the  Certkiller prodtable, which contains about ten thousand rows. Later, you updated a product name in the table.  How does this change affect the index?()

    • A、A leaf will be marked as invalid.
    • B、An update in a leaf row takes place.
    • C、The index will be updated automatically at commit.
    • D、A leaf row in the index will be deleted and inserted.
    • E、The index becomes invalid when you make any updates

    正确答案:D

  • 第2题:

    Certkiller .com has a main office and a branch office. Certkiller .com’s network consists of a single Active Directory forest. Some of the servers in the network run Windows Server 2008 and the rest run Windows server 2003.  You are the administrator at Certkiller .com. You have installed Active Directory Domain Services (AD DS) on a computer that runs Windows Server 2008. The branch office is located in a physically insecure place. It has not IT personnel onsite and there are no administrators over there. You need to setup a Read-Only Domain Controller (RODC) on the Server Core installation computer in the branch office. What should you do to setup RODC on the computer in branch office()

    • A、Execute an attended installation of AD DS
    • B、Execute an unattended installation of AD DS
    • C、Execute RODC through AD DS
    • D、Execute AD DS by using deploying the image of AD DS
    • E、none of the above

    正确答案:B

  • 第3题:

    As an administrator at Certkiller.com, you have installed an Active Directory forest that has a single domain. You have installed an Active Directory Federation services (AD FS) on the domain member server.  What should you do to configure AD FS to make sure that AD FS token contains information from the active directory domain()

    • A、Add a new account store and configure it.
    • B、Add a new resource partner and configure it
    • C、Add a new resource store and configure it
    • D、Add a new administrator account on AD FS and configure it
    • E、None of the above

    正确答案:A

  • 第4题:

    单选题
    You work as a database administrator for Certkiller .com. You determine that archiving was not successful in one of thedestinators. You want to check the alert log file for more information on this. Which initialization parameter gives you the location of the alert log file?()
    A

    USER_DUMP_DEST

    B

    CORE_DUMP_DEST

    C

    ALERT_LOG_DEST

    D

    ALERT_DUMP_DEST

    E

    TRACE_DUMP_DEST

    F

    BACKGROUND_DUMP_DEST


    正确答案: D
    解析: 暂无解析

  • 第5题:

    单选题
    You work as a database administrator for Certkiller .com. You find that reports are running for a long time in your data warehousing applications. You suspect a lack of indexes is the reason for the performance degradation.  Which advisory component would you refer to, in order to determine the appropriate indexes?()
    A

    Memory Advisors

    B

    Segment Advisors

    C

    SQL Tuning and Access Advisors

    D

    Automated Workload Repository (AWR)

    E

    Automatic Database Diagnostic Monitor (ADDM)


    正确答案: E
    解析: 暂无解析

  • 第6题:

    单选题
    You work as a database administrator for Certkiller .com. You have been asked to use a centralized administrative tool to administer your database servers and application servers. In order to achieve the objective, which component would you configure on each database server?()
    A

    Database Control

    B

    Management Server

    C

    Management Repository

    D

    Application Server Control

    E

    Oracle Management Agent


    正确答案: C
    解析: 暂无解析

  • 第7题:

    单选题
    You work as a database administrator for Certkiller .com. You are using three database, Certkiller DB01, Certkiller DB02, and Certkiller DB03, on different host machines in your development environment. The database serverconfiguration, such as IP address and listener port number, change frequently due to development requirements, and you havethe task of notifying the developers of the changes. Which connection method would you use to overcome this overhead?()
    A

    Host naming

    B

    Local naming

    C

    Easy Connect

    D

    External naming

    E

    directory naming


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    You work as a database administrator for Certkiller .com. While loading data into the Certkiller STAFF table using Oracle Enterprise Manager 10g Database Control, you find the status of the job as failed. On further investigation, you find the following error message in the output log: ORA-01653 unable to extend table HR. Certkiller STAFF by 8 intablespaceUSERS Which task would you perform to load the data successfully without affecting the users who are accessing the table?()
    A

    Restart the database instance and run the job

    B

    Truncate the Certkiller STAFF table and run the job

    C

    Delete all rows from the Certkiller STAFF table and run the job

    D

    Increase the size of the USERStablespacethe and run the job

    E

    Increase the size of the database default permanenttablespaceand run the job


    正确答案: A
    解析: 暂无解析

  • 第9题:

    多选题
    You work as a database administrator for Certkiller .com. One of the database users accidentally deleted all the rows of a critical table and committed the delete at 1:30 p.m. You senior database administrator, Certkiller, asks you to retrieve the lost data. Which two actions would you use to ensure that there is no impact on other connected users while retrieving the deleted rows?()
    A

    Use a flashback query to retrieve the rows that were deleted

    B

    Useconventialincremental export and then import the affected object

    C

    Shutdown the database inNORMALmode and restart the database instance

    D

    Use DBMS_META package to reconstruct the object using undo segments

    E

    UseTablespacePoint in Time Recovery (TSPITR) method to recover the table and the data

    F

    Use Oracle DataPumptwithflashback_timeoption toentableflashback export and then import the affected object.


    正确答案: F,A
    解析: 暂无解析

  • 第10题:

    单选题
    You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()
    A

    The SetupUser profile

    B

    The Default User profile

    C

    The Administrator profile

    D

    The System profile

    E

    The All Users profile


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    You work as a database administrator for Certkiller .com. In your organization, you have four databases, Certkiller DB01, Certkiller DB02, Certkiller DB03, and Certkiller DB04, which are located in Berlin, Frankfurt,Rammstein, and Munich respectively, and which were created using Database Configuration Assistant (DBCA).  You want to perform administrative tasks on these databases that include startup and shutdown, taking regular backups, and so on, fromFrankfurtusing Oracle tools. Which Oracle file would you enable to perform this task?()
    A

    Control file

    B

    Password file

    C

    Parameter file

    D

    Online redo log file

    E

    Listener controller file

    F

    Server parameter file


    正确答案: F
    解析: 暂无解析

  • 第12题:

    单选题
    You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode and you want to perform a backup. Which type of backup would be appropriate in this case? ()
    A

    Hot backup

    B

    Online backup

    C

    consistent backup

    D

    incremental backup

    E

    inconsistent backup


    正确答案: D
    解析: 暂无解析

  • 第13题:

    You work as a database administrator for Certkiller .com. You decided to manage client and server connections using Local Naming method in Certkiller .com. When you try to connect to the database you get the following error: ERROR:  ORA-12154:TNS:couldnot resolve service name  Which network configuration files would you look into to resolve this error?()

    • A、snmp.ora
    • B、names.ora
    • C、spfile.ora
    • D、sqlnet.ora
    • E、listener.ora
    • F、tnsnames.ora

    正确答案:D,F

  • 第14题:

    Certkiller .com has organizational units in the Active Directory domain. There are 10 servers in the organizational unit called Security. As an administrator at Certkiller .com, you generate a Group Policy Object (GPO) and link it to the Security organizational unit. What should you do to monitor the network connections to the servers in Security organizational unit()

    • A、Start the Audit Object Access option
    • B、Start the Audit System Events option
    • C、Start the Audit Logon Events option
    • D、Start the Audit process tracking option
    • E、All of the above

    正确答案:C

  • 第15题:

    单选题
    You work as a database administrator for Certkiller .com. As a result of performance analysis, you created an index on theprod_namecolumn of the  Certkiller prodtable, which contains about ten thousand rows. Later, you updated a product name in the table.  How does this change affect the index?()
    A

    A leaf will be marked as invalid.

    B

    An update in a leaf row takes place.

    C

    The index will be updated automatically at commit.

    D

    A leaf row in the index will be deleted and inserted.

    E

    The index becomes invalid when you make any updates


    正确答案: D
    解析: 暂无解析

  • 第16题:

    单选题
    You work as a database administrator for Certkiller .com. Users in the Certkiller .com PROD database complain about the slow response of transactions. While investigating the reason you find that the transactions are waiting for the undo segments to be available, and undo retention has been set to zero. What would you do to overcome this problem?()
    A

    Increase the undo return

    B

    Create more undo segments

    C

    Create another undotablespace

    D

    Increase the size of the undotablespace


    正确答案: D
    解析: 暂无解析

  • 第17题:

    单选题
    Certkiller .com has a domain controller that runs Windows Server 2008. The Certkiller .com network boosts 40 Windows Vista client machines. As an administrator at Certkiller .com, you want to deploy Active Directory Certificate service (AD CS) to authorize the network users by issuing digital certificates.  What should you do to manage certificate settings on all machines in a domain from one main location()
    A

    Configure Enterprise CA certificate settings

    B

    Configure Enterprise trust certificate settings

    C

    Configure Advance CA certificate settings

    D

    Configure Group Policy certificate settings

    E

    All of the above


    正确答案: B
    解析: 暂无解析

  • 第18题:

    多选题
    You work as a database administrator for Certkiller .com. You decided to manage client and server connections using Local Naming method in Certkiller .com. When you try to connect to the database you get the following error: ERROR:  ORA-12154:TNS:couldnot resolve service name  Which network configuration files would you look into to resolve this error?()
    A

    snmp.ora

    B

    names.ora

    C

    spfile.ora

    D

    sqlnet.ora

    E

    listener.ora

    F

    tnsnames.ora


    正确答案: E,A
    解析: 暂无解析

  • 第19题:

    单选题
    You work as a database administrator for Certkiller .com. In the Certkiller PRODUCTION database you have granted RESUMABLE system privilege to the CONNECT role.Resumablespace operation has been enabled for all user session. You want users NOT to be aware of any kind of space-related problems while performing transactions. Instead, you want the problem to be resolved by a database trigger automatically. Which combination of triggering time and event would you use to achieve this objective?()
    A

    AFTER CREATE

    B

    AFTER SUSPEND

    C

    BEFORE CREATE

    D

    AFTER TRUNCATE

    E

    BEFORE SUSPEND

    F

    AFTER INSERT OR DELETE OR DELETE

    G

    BEFORE INSERT OR DELETE OR DELETE


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    Certkiller.com has a server with Active Directory Rights Management Services (AD RMS) server installed. Users have computers with Windows Vista installed on them with an Active Directory domain installed at Windows Server 2003 functional level. As an administrator at Certkiller.com, you discover that the users are unable to benefit from AD RMS to protect their documents. You need to configure AD RMS to enable users to use it and protect their documents. What should you do to achieve this functionality()
    A

    Configure an email account in Active Directory Domain Services (AD DS) for each user.

    B

    Add and configure ADRMSADMIN account in local administrators group on the user computers

    C

    Add and configure the ADRMSSRVC account in AD RMS server’s local administrator group

    D

    Reinstall the Active Directory domain on user computers

    E

    All of the above


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    You work as a database administrator for Certkiller .com. Client connection requests are failing because the listener is not responding. You want to forward client connect requests to another listener if one listener is not responding. How do you achieve this?()
    A

    Enable instance failover

    B

    Configure shared server

    C

    Enable database failover

    D

    Enable connect-time failover

    E

    Enable Transparent Application Failover (TAF)


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    You are an administrator at Certkiller .com. Certkiller has a network of 5 member servers acting as file servers. It has an Active Directory domain. You have installed a software application on the servers. As soon as the application is installed, one of the member servers shuts down itself. To trace and rectify the problem, you create a Group Policy Object (GPO). You need to change the domain security settings to trace the shutdowns and identify the cause of it. What should you do to perform this task()
    A

    Link the GPO to the domain and enable System Events option

    B

    Link the GPO to the domain and enable Audit Object Access option

    C

    Link the GPO to the Domain Controllers and enable Audit Object Access option

    D

    Link the GPO to the Domain Controllers and enable Audit Process tracking option

    E

    Perform all of the above actions


    正确答案: D
    解析: 暂无解析

  • 第23题:

    多选题
    You work as a database administrator for Certkiller .com. Your listener process, L1,is currently listening to three databases:CertK INDB04,Certkiller DB05 and Certkiller DB06. Using Database Configuration Assistant (DBCA) you create one more database,Certkiller DB07,and enable dynamic registration.  Which two commands of Listener Control Utility (lsnrct1) would you use to determine whether the dynamic registration occurred for the database, Certkiller DB07, with the L1 listener process?()
    A

    SHOW L1

    B

    SPAWN L1

    C

    STATUS L1

    D

    SERVICES L1

    E

    STATUS LISTENER

    F

    SERVICES LISTENER

    G

    SHOWcurrent_listener


    正确答案: B,G
    解析: 暂无解析