It produces an error because a fully qualified host name needs to be specified.
It produces an error because the range of ports associated with the hosts has not been specified.
It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT and RESOLVE privileges.
It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT privilege but not the RESOLVE privilege.
第1题:
Which of the following is true of an ACL when a packet matching an ACE is found?()
第2题:
Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()
第3题:
Which of the following could be used to restrict access to the local web server to only certain IP addresses?()
第4题:
Which of the following will begin a new unit of work?()
第5题:
You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()
第6题:
You issued the following block of code: SQL>BEGIN DBMS_RESOURCE_MANAGER_PRIVS.GRANT_SWITCH_CONSUMER_GROUP( ’PROG_ROLE’, ’DEVELOPERS’ ,FALSE); END; SQL>/ Which option is NOT a result of executing the above code?()
第7题:
110 block
Demarc
Smart jack
66 block
第8题:
(a == Hello)
(a == b)
(a == c)
a.equals(b)
a.equals(d)
第9题:
The matching ACE is skipped to allow all other ACEs to be examined.
The matching ACE is processed and then the last ACE is examined.
The matching ACE is processed and then the next ACE is examined.
The matching ACE is processed and the next packet is examined
第10题:
The Pre-Block ACL is overwritten when a blockingaction is initiatied by the sensor
The blocking ACL entries generated by the sensor override the Pre-Block ACL entries
The Pre-Block ACL entries override the blocking ACL entries generated by the sensor
The Pre-Block ACL is replaced by the Post-Block ACL when a blocking actionis initiated bythe sensor
You can not configure a Pre-Block ACL when configuring IP Blockingon your sensor
第11题:
the destination was manually added to the block list
the malware category is set to blocking mode
the transaction was blocked because of application or object properties
the transaction was manually blocked by the administrative user
第12题:
The switch privilege is granted to the PROG_ROLE role.
The users granted the role PROG_ROLE will be able to switch to the DEVELOPERS group.
The users cannot grant the switch privilege to other users.
The above code will not be executed successfully because the GRANT_SWITCH_CONSUMER_GROUP procedure is an invalid procedure in Oracle10g.
第13题:
Which three statements about IOS Firewall configurations are true?()
第14题:
In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?()
第15题:
On which of the following network devices would an administrator configure an ACL?()
第16题:
Evaluate the following block of code: BEGIN DBMS_NETWORK_ACL_ADMIN.CREATE_ACL ( acl => ’mycompany-com-permissions.xml’, principal => ’ACCT_MGR’, is_grant => TRUE, privilege => ’connect’); DBMS_NETWORK_ACL_ADMIN.ASSIGN_ACL ( acl => ’mycompany-com-permissions.xml’, host => ’*.mycompany.com’); END; What is the outcome of the above code?()
第17题:
You issue the following code: EXEC DBMS_RESOURCE_MANAGER_PRIVS.GRANT_SWITCH_CONSUMER_GROUP (’SCOTT’ ’GRP1’, TRUE); What will be the result of executing the above code?()
第18题:
Create an ACL.
Create an application exception.
Configure IPSec.
Block port 80.
第19题:
Router
Hub
Repeater
NIC
第20题:
The CONNECT statement
The first FETCH of a cursor
The BEGIN TRANSACTION statement
The first executable SQL statement
第21题:
The switch privilege will be granted to the user, Scott, for changing the consumer group to GRP1.
The switch privilege will be granted to the user, Scott, for changing the consumer group from GRP1 to any other group.
The code will not execute successfully because there is no GRANT_SWITCH_CONSUMER_GROUP procedure in the DBMS_RESOURCE_MANAGER_PRIVS package.
The code will execute successfully but no privilege will be granted to the user, Scott.
第22题:
The IP inspection rule can be applied in the inbound direction on the secured interface.
The IP inspection rule can be applied in the outbound direction on the unsecured interface.
The ACL applied in the outbound direction on the unsecured interface should be an extended ACL.
The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.
For temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.
For temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.
第23题:
It is a list of remote database links stored in the XML file that are available to the users of the database.
It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.