DBMS_RLS.STATIC
DBMS_RLS.DYNAMIC
DBMS_RLS.SHARED_STATIC
DBMS_RLS.CONTEXT_SENSITIVE
DBMS_RLS.SHARED_CONTEXT_SENSITIVE
第1题:
You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()
第2题:
You work as a database administrator for Supportcenter.cn. You want to administer your database servers, which are running on different host machines, using the Web-enabled grid control interface. You have configured the agent on the host machines. You have started the Oracle Database 10g Grid Control utility on your machine. Which two additional components would you configure to achieve this objective?()
第3题:
You want to enforce a company’s business policy on several objects by using a single policy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective? ()
第4题:
You are designing for implementing Group Policy objects (GPOs) to meet the business and technical requirement. What should you do?()
第5题:
owner
touser
include
schemas
fromuser
transform
remap_schema
remap_datafile
reuse_datafiles
remap_tablespace
第6题:
The last policy is the default policy, which allows all traffic.
The order of policies is not important.
New policies are placed at the end of the policy list.
The insert command can be used to change the order.
第7题:
DBMS_RLS.STATIC
DBMS_RLS.DYNAMIC
DBMS_RLS.SHARED_STATIC
DBMS_RLS.CONTEXT_SENSITIVE
DBMS_RLS.SHARED_CONTEXT_SENSITIVE
第8题:
The endpoints can use agentless access.
Encrypted traffic flows between the endpoint and the enforcer.
Encrypted traffic flows between the endpoint and the protected resource
The endpoints can use the Odyssey Access Client.
第9题:
Error
Event
Object
Exception
Throwable
RuntimeException
第10题:
access profile
client group
client
default profile
第11题:
Line
Column
Bubble
Flowchart
OHLC candle stock
第12题:
Trusted third party SSL certificate
Authenticated Session
Wo rkstation Authentication
Remote Desktop Protocol (RDP) Signing
第13题:
Which two statements are true with regard to policy ordering? ()(Choose two.)
第14题:
Which two chart base types can you select using the Chart Wizard?()
第15题:
You want to enforce a company’s business policy on several objects by using a singlepolicy function. Which two types of policies can be assigned to the policy_type argument in the dbms_rls.add_policy procedure to achieve the above objective?()
第16题:
Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to select a digital certificate for signing Remote Desktop Protocol (.rdp) files. Which two certificate types can you use to achieve this goal?()
第17题:
Remove all deterministic function calls from within the view.
Remove all nondeterministic function calls from within the view.
Schema-bind all functions that are called from within the view.
Create the view and specify the WITH CHECK OPTION clause.
第18题:
Trusted third party SSL certificate
Authenticated Session
Workstation Authentication
Remote Desktop Protocol (RDP) Signing
第19题:
Delegate the password management controls to the help desk staff.
Delegate the password management controls to the Domain Users group.
Configure the Default Domain Policy to enforce password expiration settings.
Configure the Default Domain Controller Policy to enforce password expiration settings.
第20题:
Create one new GPO to enforce software restriction policies. Link this GPO to the domain.
Create one new GPO to enforce software restriction policies. Link this GPO to the appropriate organizational unit (OU).
Create one new GPO to enforce software restriction policies. Link this GPO to all organizational units (OUs).
Create new GPOs to match the number of organizational units (OUs).configure these GPOs to enforce software restriction policies. Link this GPO to its respective OU.
第21题:
Select Require and Enforce for the Host Checker Policy in the realm authentication policy.
Select Evaluate Policies for the Host Checker policy in the realm authentication policy.
Configure the Host Checker policy as a role restriction for the Employee role.
Configure the Host Checker policy as a resource access policy for the Employee role.
第22题:
Application Server Control
Oracle Management Service
Oracle Enterprise Manager Repository
Oracle Enterprise Manager Database Control
第23题:
Analysis Services
Reporting Services
Integration Services
Notification Services
Microsoft Sync Framework
第24题:
DBMS_RLS.STATIC
DBMS_RLS.DYNAMIC
DBMS_RLS.SHARED_STATIC
DBMS_RLS.CONTEXT_SENSITIVE
DBMS_RLS.SHARED_CONTEXT_SENSITIVE