DBMS_RLS.STATIC
DBMS_RLS.DYNAMIC
DBMS_RLS.SHARED_STATIC
DBMS_RLS.CONTEXT_SENSITIVE
DBMS_RLS.SHARED_CONTEXT_SENSITIVE
第1题:
You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()
第2题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently configured a user named Rory Allen as a Delegate for a user named Dean Austin.During the course of the business week you receive instruction from Company.com to ensurethat Rory Allen is able to add Dean Austin in the from field when sending messages whilst ensuring messages which contain Dean Austin in the From field should display Dean Austin s the message sender when the recipient receive the messages. What should you do?()
第3题:
You work as a network exchange administrator at company.com.the company.com network currently consists of a single active directory forest containing a single domain named company.com.the company.com organization makes use of microsoft exchange server 2010 as their messaging solution.company.com has recently acquired a new internet domain name from the internet service provider (isp).during the course of the business week you receive instruction from company.com to ensure that all the network users are able to send and receive e-mail messages sent to the newly acquired domain name. What should you do?()
第4题:
You are designing for implementing Group Policy objects (GPOs) to meet the business and technical requirement. What should you do?()
第5题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to prevent the network user named Rory Allen from downloading attachments which are larger than 50 KB when making use of Exchange ActiveSync whilst ensuring your solution affects no other users. What should you do?()
第6题:
A domain account should be created for each of the company’s users. And then, each domain account should be offered with access to SQL1 and the Services database.
A local logon account should be created on SQL1 for each of the company’s users. And then, each logon account should be offered with access to SQL1 and the Services database.
One SQL Server logon account should be created for all of the company’s computers running MS-DOS or UNIX-based operating systems. And then, the Enforce password policy option should be enabled for users’ accounts. At last, the logon accounts should be provided with access to the Services database.
A SQL Server logon account should be created for each of the company’s users. And then, the Enforce password policy option should be enabled for each logon account. At last, each logon account should be offered with access to the Services database.
A virtual directory should be configured through Internet Information Services (IIS) for access to SQL1. And then, users should be directed to the virtual directory for data access.
第7题:
Select Require and Enforce for the Host Checker Policy in the realm authentication policy.
Select Evaluate Policies for the Host Checker policy in the realm authentication policy.
Configure the Host Checker policy as a role restriction for the Employee role.
Configure the Host Checker policy as a resource access policy for the Employee role.
第8题:
Enable the Always wait for the network at computer startup and logon policy.
Enable the Always use classic logon policy.
Enable the Turn off background refresh of Group Policy policy.
Enable the Group Policy slow link detection policy.
第9题:
Create an Audit only restriction based on the version of the software.
Create an Audit only restriction based on the publisher of the software.
Create an Enforce rule restriction based on the version of the software.
Create an Enforce rule restriction based on the publisher of the software.
第10题:
You should consider having a Sharing policy created.You should then have Rory Allen granted Modify permission to Dean Austin’s mailbox.
You should consider having a Sharing policy created.You should then have Rory Allen granted Full Mailbox permission to Dean Austin’s mailbox.
You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send As permission to Dean Austin’s Mailbox.
You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send on Behalf permission to Dean Austin’s mailbox.
第11题:
DBMS_RLS.STATIC
DBMS_RLS.DYNAMIC
DBMS_RLS.SHARED_STATIC
DBMS_RLS.CONTEXT_SENSITIVE
DBMS_RLS.SHARED_CONTEXT_SENSITIVE
第12题:
PAP
SPAP
CHAP
MS-CHAP Version 1
MS-CHAP Version 2
第13题:
You want to enforce a company’s business policy on several objects by using a singlepolicy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective?()
第14题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messagingsolution.During the course of the business week you receive instruction from Company.com to have a set of cmdlets grouped for administrative delegation of duties.What should you do?()
第15题:
Your company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computers run windows vista. A group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computes meet the company policy requirement. What should you do?()
第16题:
You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()
第17题:
You are the desktop administrator for your company's sales department. The IT manager for the sales department creates a custom policy that will apply to a custom application that is loaded on the department's Windows XP Professional computers. He deploys this policy by using Group Policy. When you inspect the sales department's computers, you find out that the application has not been modified by the policy. You want to examine Windows XP Professional to find out whether the custom policy is affecting the correct location in the Registry. Which command should you run?()
第18题:
Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.
Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.
Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.
Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.
Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.
第19题:
msi
mst
zap
zip
第20题:
Delegate the password management controls to the help desk staff.
Delegate the password management controls to the Domain Users group.
Configure the Default Domain Policy to enforce password expiration settings.
Configure the Default Domain Controller Policy to enforce password expiration settings.
第21题:
the business knowledge of the IT staff
the technical knowledge of the IT staff
the company’s business objectives
the company’s network topology
the IT future directions
第22题:
DBMS_RLS.STATIC
DBMS_RLS.DYNAMIC
DBMS_RLS.SHARED_STATIC
DBMS_RLS.CONTEXT_SENSITIVE
DBMS_RLS.SHARED_CONTEXT_SENSITIVE
第23题:
Create one new GPO to enforce software restriction policies. Link this GPO to the domain.
Create one new GPO to enforce software restriction policies. Link this GPO to the appropriate organizational unit (OU).
Create one new GPO to enforce software restriction policies. Link this GPO to all organizational units (OUs).
Create new GPOs to match the number of organizational units (OUs).configure these GPOs to enforce software restriction policies. Link this GPO to its respective OU.
第24题:
Secedit /refreshpolicy user_policy /enforce
Secedit /refreshpolicy machine_policy /enforce
Gpupdate /target:computer /sync
Gpupdate /target:user /sync