单选题ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()AIt is a li

题目
单选题
ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()
A

 It is a list of remote database links stored in the XML file that are available to the users of the database.

B

 It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.

C

 It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.

D

 It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.


相似考题
更多“单选题ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()A  It is a ”相关问题
  • 第1题:

    You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()

    • A、show access-list
    • B、show ip access-list
    • C、show ip interface
    • D、show interface
    • E、show interface list

    正确答案:C

  • 第2题:

    Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()

    • A、The ACL applied to the vty lines has no in or out option like ACL being applied to an interface.
    • B、The ACL is applied to the Telnet port with the ip access-group command.
    • C、The ACL must be applied to each vty line individually.
    • D、The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.

    正确答案:D

  • 第3题:

    When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

    • A、Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
    • B、Configure the supplicant as anexternal authentication server
    • C、Configure RADIUS proxy on the realm
    • D、Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

    正确答案:C

  • 第4题:

    Evaluate the following block of code:   BEGIN DBMS_NETWORK_ACL_ADMIN.CREATE_ACL ( acl =>  ’mycompany-com-permissions.xml’, principal => ’ACCT_MGR’, is_grant => TRUE, privilege => ’connect’);  DBMS_NETWORK_ACL_ADMIN.ASSIGN_ACL ( acl => ’mycompany-com-permissions.xml’, host => ’*.mycompany.com’); END;   What is the outcome of the above code?()

    • A、 It produces an error because a fully qualified host name needs to be specified.
    • B、 It produces an error because the range of ports associated with the hosts has not been specified.
    • C、 It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT and  RESOLVE privileges.
    • D、 It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT privilege but not the RESOLVE privilege.

    正确答案:C

  • 第5题:

    You have lost all your database control files. To recover them, you are going to use the results of the alter database backup controlfile to trace command. Your datafiles and your online redo logs are all intact.  Which of the following is true regarding your recovery?()  

    • A、 You will need to open the database with the resetlogs command.
    • B、 All you need to do is execute the trace file from SQL*Plus and it will perform the recovery for you.
    • C、 You will use the resetlogs version of the create controlfile command.
    • D、 You will use the noresetlogs version of the create controlfile command.
    • E、 You will use the trace file to create a backup control file, and then you will recover the database with the recover database using backup controlfile command

    正确答案:D

  • 第6题:

    Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()

    • A、Configure all access points as RADIUS clients to the Remediation Servers.
    • B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).
    • C、Create a Network Policy that defines Remote Access Server as a network connection method. 
    • D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

    正确答案:B

  • 第7题:

    Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? 

    • A、Configure all access points as RADIUS clients to the Remediation Servers
    • B、Configure all access points as RADIUS clients to the Network Policy Server (NPS)
    • C、Create a Network Policy that defines Remote Access Server as a network connection method
    • D、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

    正确答案:B

  • 第8题:

    单选题
    Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()
    A

    The ACL applied to the vty lines has no in or out option like ACL being applied to an interface.

    B

    The ACL is applied to the Telnet port with the ip access-group command.

    C

    The ACL must be applied to each vty line individually.

    D

    The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()
    A

    It is a list of remote database links stored in the XML file that are available to the users of the database.

    B

    It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.

    C

    It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.

    D

    It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()
    A

    show access-list

    B

    show ip access-list

    C

    show ip interface

    D

    show interface

    E

    show interface list


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()
    A

    permit access-list 101 out

    B

    ip access-group 101 out

    C

    apply access-list 101 out

    D

    access-class 101 out

    E

    ip access-list e0 out


    正确答案: E
    解析: 暂无解析

  • 第12题:

    单选题
    Your network contains an Active Directory forest. The forest contains a single domain. You want  to access resources in a domain that is located in another forest.     You need to configure a trust between the domain in your forest and the domain in the other  forest.     What should you create()
    A

    an incoming external trust

    B

    an incoming realm trust

    C

    an outgoing external trust

    D

    an outgoing realm trust


    正确答案: B
    解析: 暂无解析

  • 第13题:

    ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()

    • A、 It is a list of remote database links stored in the XML file that are available to the users of the database.
    • B、 It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
    • C、 It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
    • D、 It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

    正确答案:B

  • 第14题:

    With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()

    • A、IETF
    • B、PFC
    • C、TCAM
    • D、ASIC

    正确答案:B

  • 第15题:

    You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()

    • A、CLI
    • B、WebUI
    • C、NSM
    • D、Junos Pulse Access Control Service

    正确答案:C,D

  • 第16题:

    You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()

    • A、It is a list of remote database links stored in the XML file that are available to the users of the database.
    • B、It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
    • C、It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
    • D、It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

    正确答案:B

  • 第17题:

    Your network contains an Active Directory forest. The forest contains a single domain. You want  to access resources in a domain that is located in another forest.     You need to configure a trust between the domain in your forest and the domain in the other  forest.     What should you create()

    • A、an incoming external trust
    • B、an incoming realm trust
    • C、an outgoing external trust
    • D、an outgoing realm trust

    正确答案:A

  • 第18题:

    You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()

    • A、Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses
    • B、Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use
    • C、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks
    • D、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

    正确答案:D

  • 第19题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The domain includes an organizational unit (OU) named Processing. There are 100 computer accounts in the Processing OU. You create a Group Policy object (GPO) named NetworkSecurity and link it to the domain. You configure NetworkSecurity to enable security settings through the Computer Configuration section of the Group Policy settings. You need to ensure that NetworkSecurity will apply only to the computers in the Processing OU. You need to minimize the number of GPO links.  What should you do?()

    • A、 Link NetworkSecurity to the Processing OU. Disable the User Configuration section of NetworkSecurity.
    • B、 Link NetworkSecurity to the Processing OU. Remove the link from NetworkSecurity to the domain.
    • C、 Modify the discretionary access control list (DACL) for NetworkSecurity to assign all computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.
    • D、 Modify the discretionary access control list (DACL) for NetworkSecurity to assign the Authenticated Users group the Deny - Apply Group Policy permission and to assign all of the computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.

    正确答案:B

  • 第20题:

    单选题
    You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()
    A

    Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses

    B

    Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use

    C

    Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks

    D

    Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()
    A

    IETF

    B

    PFC

    C

    TCAM

    D

    ASIC


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The domain includes an organizational unit (OU) named Processing. There are 100 computer accounts in the Processing OU. You create a Group Policy object (GPO) named NetworkSecurity and link it to the domain. You configure NetworkSecurity to enable security settings through the Computer Configuration section of the Group Policy settings. You need to ensure that NetworkSecurity will apply only to the computers in the Processing OU. You need to minimize the number of GPO links.  What should you do?()
    A

     Link NetworkSecurity to the Processing OU. Disable the User Configuration section of NetworkSecurity.

    B

     Link NetworkSecurity to the Processing OU. Remove the link from NetworkSecurity to the domain.

    C

     Modify the discretionary access control list (DACL) for NetworkSecurity to assign all computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.

    D

     Modify the discretionary access control list (DACL) for NetworkSecurity to assign the Authenticated Users group the Deny - Apply Group Policy permission and to assign all of the computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Evaluate the following block of code:   BEGIN DBMS_NETWORK_ACL_ADMIN.CREATE_ACL ( acl =>  ’mycompany-com-permissions.xml’, principal => ’ACCT_MGR’, is_grant => TRUE, privilege => ’connect’);  DBMS_NETWORK_ACL_ADMIN.ASSIGN_ACL ( acl => ’mycompany-com-permissions.xml’, host => ’*.mycompany.com’); END;   What is the outcome of the above code?()
    A

     It produces an error because a fully qualified host name needs to be specified.

    B

     It produces an error because the range of ports associated with the hosts has not been specified.

    C

     It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT and  RESOLVE privileges.

    D

     It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT privilege but not the RESOLVE privilege.


    正确答案: B
    解析: 暂无解析