多选题You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()ADBMS_R

题目
多选题
You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()
A

DBMS_RLS.STATIC

B

DBMS_RLS.DYNAMIC

C

DBMS_RLS.SHARED_STATIC

D

DBMS_RLS.CONTEXT_SENSITIVE

E

DBMS_RLS.SHARED_CONTEXT_SENSITIVE


相似考题
更多“You want to enforce a company’s business policy on several o”相关问题
  • 第1题:

    You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()

    • A、 DBMS_RLS.STATIC
    • B、 DBMS_RLS.DYNAMIC
    • C、 DBMS_RLS.SHARED_STATIC
    • D、 DBMS_RLS.CONTEXT_SENSITIVE
    • E、 DBMS_RLS.SHARED_CONTEXT_SENSITIVE

    正确答案:C,E

  • 第2题:

    You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently configured a user named Rory Allen as a Delegate for a user named Dean Austin.During the course of the business week you receive instruction from Company.com to ensurethat Rory Allen is able to add Dean Austin in the from field when sending messages whilst ensuring messages which contain Dean Austin in the From field should display Dean Austin s the message sender when the recipient receive the messages.  What should you do?()

    • A、You should consider having a Sharing policy created.You should then have Rory Allen granted Modify permission to Dean Austin’s mailbox.
    • B、You should consider having a Sharing policy created.You should then have Rory Allen granted Full Mailbox permission to Dean Austin’s mailbox.
    • C、You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send As permission to Dean Austin’s Mailbox.
    • D、You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send on Behalf permission to Dean Austin’s mailbox.

    正确答案:C

  • 第3题:

    You work as a network exchange administrator at company.com.the company.com network currently consists of a single active directory forest containing a single domain named company.com.the company.com organization makes use of microsoft exchange server 2010 as their messaging solution.company.com has recently acquired a new internet domain name from the internet service provider (isp).during the course of the business week you receive instruction from company.com to ensure that all the network users are able to send and receive e-mail messages sent to the newly acquired domain name. What should you do?()

    • A、you should consider having an accepted domain and an e-mail address policy created.
    • B、you should consider having the properties of the default receive connector modified.
    • C、you should consider having an accepted domain and a sharing policy created.
    • D、you should consider having a remote domain and an e-mail address policy created.

    正确答案:A

  • 第4题:

    You are designing for implementing Group Policy objects (GPOs) to meet the business and technical requirement. What should you do?()

    • A、Create one new GPO to enforce software restriction policies. Link this GPO to the domain.
    • B、Create one new GPO to enforce software restriction policies. Link this GPO to the appropriate  organizational unit (OU).
    • C、Create one new GPO to enforce software restriction policies. Link this GPO to all organizational units (OUs).
    • D、Create new GPOs to match the number of organizational units (OUs).configure these GPOs to enforce software restriction policies. Link this GPO to its respective OU.

    正确答案:A

  • 第5题:

    You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to prevent the network user named Rory Allen from downloading attachments which are larger than 50 KB when making use of Exchange ActiveSync whilst ensuring your solution affects no other users. What should you do?()

    • A、You should consider having the properties of Rory Allen’s mailbox modified.
    • B、You should consider having the properties if the default Exchange ActiveSync Mailbox policy modified.
    • C、You should consider having a new ActiveSynce Device Access rule created.
    • D、You should consider having a new Exchange ActiveSync Mailbox policy created.

    正确答案:D

  • 第6题:

    单选题
    You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as the administrator of a SQL Server 2005 computer, and the computer is named SQL1. Microsoft Windows Server 2003 is run by all servers. All the servers belong to a Microsoft Active Directory domain. According to the company written security policy, strong passwords are mandated for all domain, local, and application accounts. The company utilizes a Group Policy object (GPO) to deploy the proper domain password policy. MS-DOS-based or UNIX-based operating systems are run by many of the company’s computers. Varying levels of access to a database named Services on SQL1 is requested by the computers. Since you are the database administrator, you are required to confirm that the Services database can be accessed by these computers. And the company’s written security policy should not be violated.  Which action should be performed by you?()
    A

    A domain account should be created for each of the company’s users. And then, each domain account should be offered with access to SQL1 and the Services database.

    B

    A local logon account should be created on SQL1 for each of the company’s users. And then, each logon account should be offered with access to SQL1 and the Services database.

    C

    One SQL Server logon account should be created for all of the company’s computers running MS-DOS or UNIX-based operating systems. And then, the Enforce password policy option should be enabled for users’ accounts. At last, the logon accounts should be provided with access to the Services database.

    D

    A SQL Server logon account should be created for each of the company’s users. And then, the Enforce password policy option should be enabled for each logon account. At last, each logon account should be offered with access to the Services database.

    E

    A virtual directory should be configured through Internet Information Services (IIS) for access to SQL1. And then, users should be directed to the virtual directory for data access.


    正确答案: C
    解析: 暂无解析

  • 第7题:

    多选题
    You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()
    A

    Select Require and Enforce for the Host Checker Policy in the realm authentication policy.

    B

    Select Evaluate Policies for the Host Checker policy in the realm authentication policy.

    C

    Configure the Host Checker policy as a role restriction for the Employee role.

    D

    Configure the Host Checker policy as a resource access policy for the Employee role.


    正确答案: B,D
    解析: 暂无解析

  • 第8题:

    单选题
    You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute three custom applications to the department's Windows XP Professional computers. She deploys these applications by using Group Policy. Some users report that they must log on several times before the newly deployed applications are present on their computers. You need to ensure that all software is deployed the next time the users log on. What should you do?()
    A

    Enable the Always wait for the network at computer startup and logon policy.

    B

    Enable the Always use classic logon policy. 

    C

    Enable the Turn off background refresh of Group Policy policy.

    D

    Enable the Group Policy slow link detection policy. 


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The R&D department staff are local administrators on their computers and are members of the R&D global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the R&D group. You need to ensure that members of the R&D group are not allowed to upgrade the software. What should you do?()
    A

    Create an Audit only restriction based on the version of the software.

    B

    Create an Audit only restriction based on the publisher of the software.

    C

    Create an Enforce rule restriction based on the version of the software.

    D

    Create an Enforce rule restriction based on the publisher of the software.


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently configured a user named Rory Allen as a Delegate for a user named Dean Austin.During the course of the business week you receive instruction from Company.com to ensurethat Rory Allen is able to add Dean Austin in the from field when sending messages whilst ensuring messages which contain Dean Austin in the From field should display Dean Austin s the message sender when the recipient receive the messages.  What should you do?()
    A

    You should consider having a Sharing policy created.You should then have Rory Allen granted Modify permission to Dean Austin’s mailbox.

    B

    You should consider having a Sharing policy created.You should then have Rory Allen granted Full Mailbox permission to Dean Austin’s mailbox.

    C

    You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send As permission to Dean Austin’s Mailbox.

    D

    You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send on Behalf permission to Dean Austin’s mailbox.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    多选题
    You want to enforce a company’s business policy on several objects by using a singlepolicy function.  Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective?()
    A

    DBMS_RLS.STATIC

    B

    DBMS_RLS.DYNAMIC

    C

    DBMS_RLS.SHARED_STATIC

    D

    DBMS_RLS.CONTEXT_SENSITIVE

    E

    DBMS_RLS.SHARED_CONTEXT_SENSITIVE


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    多选题
    You are the network administrator for your company. All servers run Windows Server 2003.   You configure the Routing and Remote Access service on a server named Server2. Server2 is connected to a modem pool and supports eight simultaneous inbound connections. You instruct remote users to dial in to Server2 from their home computers.The company’s written business policy states that the only client computer operating systems that should be supported for dial-up access are Windows 95, Windows 98, Windows 2000 Professional, and Windows XP Professional.You need to configure the remote access policy to support the most secure authentication methods possible. You want to enable only the necessary authentication methods based on the supported client computers that will be connecting.   Which authentication method or methods should you enable?()
    A

    PAP

    B

    SPAP

    C

    CHAP

    D

    MS-CHAP Version 1

    E

    MS-CHAP Version 2


    正确答案: B,C
    解析: 暂无解析

  • 第13题:

    You want to enforce a company’s business policy on several objects by using a singlepolicy function.  Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective?()

    • A、DBMS_RLS.STATIC
    • B、DBMS_RLS.DYNAMIC
    • C、DBMS_RLS.SHARED_STATIC
    • D、DBMS_RLS.CONTEXT_SENSITIVE
    • E、DBMS_RLS.SHARED_CONTEXT_SENSITIVE

    正确答案:C,E

  • 第14题:

    You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messagingsolution.During the course of the business week you receive instruction from Company.com to have a set of cmdlets grouped for administrative delegation of duties.What should you do?()

    • A、You should consider having a new management role created.
    • B、You should consider having a new role assignment policy created.
    • C、You should consider having a managed folder mailbox policy created.
    • D、You should consider having a new distribution group created.

    正确答案:A

  • 第15题:

    Your company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computers run windows vista. A group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computes meet the company policy requirement. What should you do?()

    • A、Enable automatic updates on each client.
    • B、Enable the security center on each client.
    • C、Quarantine clients that do not have all available security updates installed.
    • D、Disconnect the remote connection until the required updates are installed.

    正确答案:C

  • 第16题:

    You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()

    • A、Use Security Templates to correct the setting and export the security file.
    • B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.
    • C、Use Secedit /RefreshPolicy Machine_Policy command.
    • D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

    正确答案:C

  • 第17题:

    You are the desktop administrator for your company's sales department. The IT manager for the sales department creates a custom policy that will apply to a custom application that is loaded on the department's Windows XP Professional computers. He deploys this policy by using Group Policy. When you inspect the sales department's computers, you find out that the application has not been modified by the policy. You want to examine Windows XP Professional to find out whether the custom policy is affecting the correct location in the Registry. Which command should you run?()

    • A、Msinfo32. exe
    • B、Gpresult.exe
    • C、Gpedit.msc
    • D、Rsop.msc

    正确答案:B

  • 第18题:

    单选题
    You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy.  What should you do?()
    A

    Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.

    B

    Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.

    C

    Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.

    D

    Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.

    E

    Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()
    A

    msi

    B

    mst

    C

    zap

    D

    zip


    正确答案: B
    解析: 暂无解析

  • 第20题:

    多选题
    You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()
    A

    Delegate the password management controls to the help desk staff.

    B

    Delegate the password management controls to the Domain Users group.

    C

    Configure the Default Domain Policy to enforce password expiration settings.

    D

    Configure the Default Domain Controller Policy to enforce password expiration settings.


    正确答案: A,C
    解析: 暂无解析

  • 第21题:

    单选题
    Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
    A

     the business knowledge of the IT staff

    B

     the technical knowledge of the IT staff

    C

     the company’s business objectives

    D

     the company’s network topology

    E

     the IT future directions


    正确答案: B
    解析: 暂无解析

  • 第22题:

    多选题
    You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()
    A

    DBMS_RLS.STATIC

    B

    DBMS_RLS.DYNAMIC

    C

    DBMS_RLS.SHARED_STATIC

    D

    DBMS_RLS.CONTEXT_SENSITIVE

    E

    DBMS_RLS.SHARED_CONTEXT_SENSITIVE


    正确答案: E,B
    解析: 暂无解析

  • 第23题:

    单选题
    You are designing for implementing Group Policy objects (GPOs) to meet the business and technical requirement.  What should you do? ()
    A

     Create one new GPO to enforce software restriction policies. Link this GPO to the domain.

    B

     Create one new GPO to enforce software restriction policies. Link this GPO to the appropriate organizational unit (OU).

    C

     Create one new GPO to enforce software restriction policies. Link this GPO to all organizational units (OUs).

    D

     Create new GPOs to match the number of organizational units (OUs).configure these GPOs to enforce software restriction policies. Link this GPO to its respective OU.


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute a custom application to the Windows XP Professional computers in the sales department. He deploys the software by using Group Policy. Susan is a user in the sales department. She reports that the custom application is not available. You examine her computer, and you verify that the application is not present on her computer. You want to ensure that the software is deployed the next time Susan logs on. Which command should you run?()
    A

    Secedit /refreshpolicy user_policy /enforce

    B

    Secedit /refreshpolicy machine_policy /enforce

    C

    Gpupdate /target:computer /sync

    D

    Gpupdate /target:user /sync


    正确答案: D
    解析: 暂无解析