单选题Evaluate the following block of code:   BEGIN DBMS_NETWORK_ACL_ADMIN.CREATE_ACL ( acl =>  ’mycompany-com-permissions.xml’, principal => ’ACCT_MGR’, is_grant => TRUE, privilege => ’connect’);  DBMS_NETWORK_ACL_ADMIN.ASSIGN_ACL ( acl => ’mycompany-com-pe

题目
单选题
Evaluate the following block of code:   BEGIN DBMS_NETWORK_ACL_ADMIN.CREATE_ACL ( acl =>  ’mycompany-com-permissions.xml’, principal => ’ACCT_MGR’, is_grant => TRUE, privilege => ’connect’);  DBMS_NETWORK_ACL_ADMIN.ASSIGN_ACL ( acl => ’mycompany-com-permissions.xml’, host => ’*.mycompany.com’); END;   What is the outcome of the above code?()
A

 It produces an error because a fully qualified host name needs to be specified.

B

 It produces an error because the range of ports associated with the hosts has not been specified.

C

 It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT and  RESOLVE privileges.

D

 It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT privilege but not the RESOLVE privilege.


相似考题
更多“单选题Evaluate the following block of code:   BEGIN DBMS_NETWORK_ACL_ADMIN.CREATE_ACL ( acl =  ’mycompany-com-permissions.xml’, principal = ’ACCT_MGR’, is_grant = TRUE, privilege = ’connect’);  DBMS_NETWORK_ACL_ADMIN.ASSIGN_ACL ( acl = ’mycompany-com-permiss”相关问题
  • 第1题:

    Which of the following is true of an ACL when a packet matching an ACE is found?()

    • A、The matching ACE is skipped to allow all other ACEs to be examined.
    • B、The matching ACE is processed and then the last ACE is examined.
    • C、The matching ACE is processed and then the next ACE is examined.
    • D、The matching ACE is processed and the next packet is examined

    正确答案:D

  • 第2题:

    Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()

    • A、It can be used to block bulk encryption attacks
    • B、It can be used to protect against denial of service attacks
    • C、Traffic originating from the router is considered trusted, so it is not inspected
    • D、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanently
    • E、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

    正确答案:B,E

  • 第3题:

    Which of the following could be used to restrict access to the local web server to only certain IP addresses?()

    • A、 Create an ACL.
    • B、 Create an application exception.
    • C、 Configure IPSec.
    • D、 Block port 80.

    正确答案:A

  • 第4题:

    Which of the following will begin a new unit of work?()

    • A、The CONNECT statement
    • B、The first FETCH of a cursor
    • C、The BEGIN TRANSACTION statement
    • D、The first executable SQL statement

    正确答案:D

  • 第5题:

    You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()

    • A、It is a list of remote database links stored in the XML file that are available to the users of the database.
    • B、It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
    • C、It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
    • D、It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

    正确答案:B

  • 第6题:

    You issued the following block of code:        SQL>BEGIN   DBMS_RESOURCE_MANAGER_PRIVS.GRANT_SWITCH_CONSUMER_GROUP(        ’PROG_ROLE’, ’DEVELOPERS’ ,FALSE);        END;        SQL>/   Which option is NOT a result of executing the above code?()  

    • A、 The switch privilege is granted to the PROG_ROLE role.
    • B、 The users granted the role PROG_ROLE will be able to switch to the DEVELOPERS group.
    • C、 The users cannot grant the switch privilege to other users.
    • D、 The above code will not be executed successfully because the GRANT_SWITCH_CONSUMER_GROUP procedure is an invalid procedure in Oracle10g.

    正确答案:D

  • 第7题:

    单选题
    Which of the following wiring distribution components uses a bridge clip to connect both sides ofthe block?()
    A

    110 block

    B

    Demarc

    C

    Smart jack

    D

    66 block


    正确答案: B
    解析: 暂无解析

  • 第8题:

    多选题
    Which expressions will evaluate to true if preceded by the following code?()   String a = "hello";   String b = new String(a);   String c = a;   char[] d = { ’h’, ’e’, ’l’, ’l’, ’o’ };
    A

    (a == Hello)

    B

    (a == b)

    C

    (a == c)

    D

    a.equals(b)

    E

    a.equals(d)


    正确答案: C,D
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following is true of an ACL when a packet matching an ACE is found?()
    A

    The matching ACE is skipped to allow all other ACEs to be examined.

    B

    The matching ACE is processed and then the last ACE is examined.

    C

    The matching ACE is processed and then the next ACE is examined.

    D

    The matching ACE is processed and the next packet is examined


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    What is true about a Pre-Block ACLconfigured when setting up your sensor toperform IP Blocking?()
    A

     The Pre-Block ACL is overwritten when a blockingaction is initiatied by the sensor

    B

     The blocking ACL entries generated by the sensor override the Pre-Block ACL entries

    C

     The Pre-Block ACL entries override the blocking ACL entries generated by the sensor

    D

     The Pre-Block ACL is replaced by the Post-Block ACL when a blocking actionis initiated bythe sensor

    E

     You can not configure a Pre-Block ACL when configuring IP Blockingon your sensor


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?()
    A

     the destination was manually added to the block list

    B

     the malware category is set to blocking mode

    C

     the transaction was blocked because of application or object properties

    D

     the transaction was manually blocked by the administrative user


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    You issued the following block of code:        SQL>BEGIN   DBMS_RESOURCE_MANAGER_PRIVS.GRANT_SWITCH_CONSUMER_GROUP(        ’PROG_ROLE’, ’DEVELOPERS’ ,FALSE);        END;        SQL>/   Which option is NOT a result of executing the above code?()
    A

     The switch privilege is granted to the PROG_ROLE role.

    B

     The users granted the role PROG_ROLE will be able to switch to the DEVELOPERS group.

    C

     The users cannot grant the switch privilege to other users.

    D

     The above code will not be executed successfully because the GRANT_SWITCH_CONSUMER_GROUP procedure is an invalid procedure in Oracle10g.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which three statements about IOS Firewall configurations are true?()

    • A、The IP inspection rule can be applied in the inbound direction on the secured interface.
    • B、The IP inspection rule can be applied in the outbound direction on the unsecured interface.
    • C、The ACL applied in the outbound direction on the unsecured interface should be an extended ACL.
    • D、The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.
    • E、For temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.
    • F、For temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.

    正确答案:A,B,D

  • 第14题:

    In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?() 

    • A、 the destination was manually added to the block list
    • B、 the malware category is set to blocking mode
    • C、 the transaction was blocked because of application or object properties
    • D、 the transaction was manually blocked by the administrative user

    正确答案:D

  • 第15题:

    On which of the following network devices would an administrator configure an ACL?()

    • A、Router
    • B、Hub
    • C、Repeater
    • D、NIC

    正确答案:A

  • 第16题:

    Evaluate the following block of code:   BEGIN DBMS_NETWORK_ACL_ADMIN.CREATE_ACL ( acl =>  ’mycompany-com-permissions.xml’, principal => ’ACCT_MGR’, is_grant => TRUE, privilege => ’connect’);  DBMS_NETWORK_ACL_ADMIN.ASSIGN_ACL ( acl => ’mycompany-com-permissions.xml’, host => ’*.mycompany.com’); END;   What is the outcome of the above code?()

    • A、 It produces an error because a fully qualified host name needs to be specified.
    • B、 It produces an error because the range of ports associated with the hosts has not been specified.
    • C、 It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT and  RESOLVE privileges.
    • D、 It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT privilege but not the RESOLVE privilege.

    正确答案:C

  • 第17题:

    You issue the following code:    EXEC DBMS_RESOURCE_MANAGER_PRIVS.GRANT_SWITCH_CONSUMER_GROUP        (’SCOTT’ ’GRP1’, TRUE);   What will be the result of executing the above code?()  

    • A、 The switch privilege will be granted to the user, Scott, for changing the consumer group to GRP1.
    • B、 The switch privilege will be granted to the user, Scott, for changing the consumer group from GRP1 to any other group.
    • C、 The code will not execute successfully because there is no GRANT_SWITCH_CONSUMER_GROUP procedure in the DBMS_RESOURCE_MANAGER_PRIVS package.
    • D、The code will execute successfully but no privilege will be granted to the user, Scott.

    正确答案:A

  • 第18题:

    单选题
    Which of the following could be used to restrict access to the local web server to only certain IP addresses?()
    A

     Create an ACL.

    B

     Create an application exception.

    C

     Configure IPSec.

    D

     Block port 80.


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    On which of the following network devices would an administrator configure an ACL?()
    A

    Router

    B

    Hub

    C

    Repeater

    D

    NIC


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following will begin a new unit of work?()
    A

    The CONNECT statement

    B

    The first FETCH of a cursor

    C

    The BEGIN TRANSACTION statement

    D

    The first executable SQL statement


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    You issue the following code:    EXEC DBMS_RESOURCE_MANAGER_PRIVS.GRANT_SWITCH_CONSUMER_GROUP        (’SCOTT’ ’GRP1’, TRUE);   What will be the result of executing the above code?()
    A

     The switch privilege will be granted to the user, Scott, for changing the consumer group to GRP1.

    B

     The switch privilege will be granted to the user, Scott, for changing the consumer group from GRP1 to any other group.

    C

     The code will not execute successfully because there is no GRANT_SWITCH_CONSUMER_GROUP procedure in the DBMS_RESOURCE_MANAGER_PRIVS package.

    D

    The code will execute successfully but no privilege will be granted to the user, Scott.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    Which three statements about IOS Firewall configurations are true?()
    A

    The IP inspection rule can be applied in the inbound direction on the secured interface.

    B

    The IP inspection rule can be applied in the outbound direction on the unsecured interface.

    C

    The ACL applied in the outbound direction on the unsecured interface should be an extended ACL.

    D

    The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.

    E

    For temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.

    F

    For temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.


    正确答案: A,D
    解析: 暂无解析

  • 第23题:

    单选题
    ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()
    A

     It is a list of remote database links stored in the XML file that are available to the users of the database.

    B

     It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.

    C

     It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.

    D

     It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.


    正确答案: D
    解析: 暂无解析