A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel. Which users can be seen and what actions can be performed()
第1题:
Which two statements are true when using the configure exclusive CLI command?()
第2题:
Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()
第3题:
Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
第4题:
What are three actions performed by the mysql_secure_installation tool?()
第5题:
Which two statements accurately describe a role?()
第6题:
Your network contains a server named Server1 that runs Windows Server 2008 R2. You have a user named User1. You need to ensure that User1 can schedule Data Collector Sets (DCSs) on Server1. The solution must minimize the number of rights assigned to User1. What should you do?()
第7题:
You are the network administrator for Among other duties you administer a Windows 2003 server named TestKingB. You install Terminal Services on TestKingB. You add users from the TestKing support department to the Power Users group and to the Remote Desktop Users group on TestKingB. You notice that TestKingB is periodically unavailable. You open Event Viewer on TestKingB and discover that the server was restarted accidentally by users in the TestKing support department. You need to ensure that users in the TestKing support department can establish a Terminal Services session and can manage local user accounts on TestKingB. However, they should not have the ability to restart TestKingB. Which action or actions should you perform? Select all that apply.()
第8题:
You are the network administrator for You administer a Windows Server 2003 computer named TestKing3. A user needs to share documents that are stored in a folder on TestKing3 with other users in his department. When she attempt to share the folder, she discovers that the Sharing tab is missing. You need to ensure that the user can share the documents on TestKing3. You need to ensure that you grant the user the minimum amount of permissions required. What should you do?()
第9题:
The user SKD can grant only the MGR_ROLE role to other users, but not the privileges in it.
The user SKD can revoke the MGR_ROLE only from the users for whom he/she is the grantor.
The user SKD can grant the privileges in the MGR_ROLE role to other users, but not with ADMIN OPTION.
The user SKD can grant the privileges in the MGR_ROLE role to other users, but cannot revoke privilegesfrom them
第10题:
Multiple users can enter configuration mode and have their own private configuration.
When a user commits, only the user's changes are committed.
A message indicates which other users are in configuration mode and what portion of the configuration they are editing.
Only a single user can edit the configuration.
第11题:
Remove the TestKing Support department user accounts from the Power Users group.
Remove the TestKing Support department user accounts from the Remote Desktop Users group.
Remove the Power Users group from the Shut down the system user right.
Add the Power Users group to the Deny log on locally user right.
Modify the permission on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission
第12题:
the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor group
the user can see all the users except those in the Admin group, but can only modify the user’s own account
the user can see only the user’s own account, and cannot modify it
the user can see only the user’s own account, and can change the password only
第13题:
You have a hosted Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack l (SP1) installed.The organization contains a distribution group named Group1.You need to ensure that a user named User1 can review and approve all messages sent to Group1. What should you do?()
第14题:
View the Exhibit to observe the roles assigned to the SL_REP user. Which statement is true about theassignment of the SELECT_CATALOG_ROLE role to the SL_REP user()
第15题:
Examine the command: SQL> ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()
第16题:
Examine the query and its output executed In an RDBMS Instance:Which three statements are true about the users (other than sys) in the output?()
第17题:
Which three statements are true about the working of system privileges in a multitenant control database(CDB) that has pluggable databases (PDBs)?()
第18题:
You have an Exchange 2010 organization.The organization contains a distribution group named Group1.You need to ensure that a user named User1 can add and remove members from Group1.You must prevent User1 from modifying all other groups. What should you do first?()
第19题:
Your company has four offices. The network contains a single Active Directory domain. Each office has domain controller. Each office has an organitational unit (OU) that contains the user accounts for the users in that office. In each office, support technicians perform basic troubleshooting for the users in their respective office. You need to ensure that the support technicians can reset the password for the user accounts in their respective office only. The solution must prevent the thechnicians from creating user accounts. What shoul you do()
第20题:
The user must enable the role explicitly.
The user can grant the role to other users.
The user cannot use the role until the DBA enables it explicitly.
The user can start using the role immediately without any changes
第21题:
It can be used to allow the access privilege settings for users but not roles.
It can be used to allow the access privilege settings for users as well as roles.
It can be used to control the time interval for which the access privilege is available to a user.
It can be used to selectively restrict the access for each user in a database to different host computers.
It can be used to selectively restrict a user's access to different applications in a specific host computer.
第22题:
Remove the technical support user accounts from the Power Users group.
Remove the technical support user accounts from the Remote Desktop Users group.
Remove the Power Users group from the Shut down the system user right.
Add the Power Users group to the Deny log on locally user right.
Modify the permissions on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission.
第23题:
On Folder1, modify the share permissions.
On Folder1, modify the NTFS permissions.
Add all local user accounts to the Guests group.
Add all local user accounts to the Network Configuration Operators group.