Security
Audit
Application
System
第1题:
To make audit information more productive, the DBA executes the following command before startingan audit operation: SQL> ALTER SYSTEM SET AUDIT_TRAIL=DB,EXTENDED SCOPE=SPFILE; Which statement is true regarding the audit record generated when auditing starts after restarting thedatabase()
第2题:
Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()
第3题:
A server is having problems booting into the operating system. Which of the following can provide important information to begin to trouble shoot the cause?()
第4题:
Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()
第5题:
Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: Allow Admin1 to monitor events in the system event log and the application event logAllow Admin1 to create and view counter logs in Performance MonitorMinimize the user rights assigned to Admin1 To .which group should you add Admin1?()
第6题:
Preservation
Migration
New and complete overwrite
Repair
第7题:
From Reliability Monitor, review the informational events.
From System Information, review the Software Environment.
From Performance Monitor, review the System Diagnostics Report.
From Performance Monitor, run the System Performance Data Collector Set.
第8题:
Power Users.
Administrators.
Performance Log Users.
Performance Monitor Users.
第9题:
System logs
Firmware updates
POST messages
Application logs
第10题:
IBM eConfig
IBM Performance Monitor
IBM Workload Estimator (WLE)
IBM System Planning Tool (SPT)
第11题:
It contains only the plan for the SQL statement executed by the user.
It contains the SQL text executed by the user and the bind variables used with it.
It contains the plan and statistics associated with the SQL statement executed by the user.
It contains the plan for the SQL statement executed by the user and the bind variables used with it.
第12题:
System logs
Firmware updates
POST messages
Application logs
第13题:
Which of the following protocols can be used to retrieve system and network performance information from a router?()
第14题:
Which of the following logs contains information on overall performance and events not related to user authentication?()
第15题:
A System p adminstrator must recover user information from a system that will not successfully boot. Which of the following install methods will accomplish this ()
第16题:
Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()
第17题:
You have a computer that runs Windows 7. You need to identify which applications were installed during thelast week. What should you do?()
第18题:
LDAP
IMAP
TFTP
SNMP
第19题:
Configure System Monitor to monitor the authentication events.
Configure Performance Logs and Alerts with a counter log to record the authentication events.
Configure Network Monitor to record the authentication events.
Configure Performance Logs and Alerts with an alert to trigger on authentication events.
第20题:
CHAP
Kerberos
TACACS
EAP
第21题:
Software problems don't generate errors.
The user is more knowledgeable about software.
The system logs will provide useful information alone.
Key information pertaining to the software may be uncovered.
第22题:
It contains only the plan for the SQL statement executed by the user.
It contains the SQL text executed by the user and the bind variables used with it.
It contains the plan and statistics associated with the SQL statement executed by the user.
It contains the plan for the SQL statement executed by the user and the bind variables used with it
第23题:
Administrator
User
Guest
Power user