单选题In your Supportcenter.cn production database,you find that the database users are able to create and read files with unstructured data,available in any location on the host machine from an application. You want to restrict the database users to access 

题目
单选题
In your Supportcenter.cn production database,you find that the database users are able to create and read files with unstructured data,available in any location on the host machine from an application. You want to restrict the database users to access files in a specific location on the host machine. What could do to achieve this?()
A

Modify the value for the UTL_FILE_DIR parameter in the parameter file

B

Grant read and write privilege on the operating system path to the database users

C

Modify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter file

D

Modify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter file

E

Create a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users


相似考题
更多“单选题In your Supportcenter.cn production database,you find that the database users are able to create and read files with unstructured data,available in any location on the host machine from an application. You want to restrict the database users to access ”相关问题
  • 第1题:

    In your Certkiller .com production database, you find that the database users are able to create and read files with unstructured data, available in any location on the host machine from an application.  You want to restrict the database users to access files in a specific location on the host machine.  What could do to achieve this?()

    • A、Modify the value for the UTL_FILE_DIR parameter in the parameter file
    • B、Grant read and write privilege on the operating system path to the database users
    • C、Modify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter file
    • D、Modify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter file
    • E、Create a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users

    正确答案:A

  • 第2题:

    Your production database uses an Automatic Storage Management (ASM) instance to manage its files. You want to add a new disk group to the ASM instance to manage the increased data load. What action would you perform to include the new disk group in the ASM instance without causing any impact on the currently connected users?()

    • A、mount the new disk group in the ASM instance
    • B、restart the ASM instance and the production database instance
    • C、register the new disk groups in the production database instance
    • D、restart the ASM instance without restarting the production database instance
    • E、include the new disk group in the ASM_DISKSTRING parameter in the parameter file and restart the ASM instance

    正确答案:A

  • 第3题:

    You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()

    • A、It is a list of remote database links stored in the XML file that are available to the users of the database.
    • B、It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
    • C、It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
    • D、It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

    正确答案:B

  • 第4题:

    In Recovery Manager (RMAN), you are taking image copies of the data files of your production database and rolling them forward at regular intervals. You attempt to restart your database. After a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the data file by using the image copy. Because a media failure caused the data file to be damaged, you want to place the data file in a different location while restoring the file. Which option must you consider for this task?()

    • A、using only the RMAN SWITCH command to set the new location for the data file
    • B、placing the database in the MOUNT state for the restore and recovery operations.
    • C、using an RMAN RUN block with the SET NEWNAME and then the SWITCH command.
    • D、configuring two channels: one for the restore operation and the other for the recovery operation

    正确答案:C

  • 第5题:

    Two data files have been deleted at the operating system level by accident. Your database is running in ARCHIVELOG mode and online backups are taken nightly. One of the data files that has been deleted belongs to the USERS tablespace on the other belongs to the SYSTEM tablespace. How can you recover from this situation?()

    • A、Shut down the database, restore the two data files and then start up the database. 
    • B、Take the system and users tablespace offline, restore the two data files, recover the two datafiles, and then bring the SYSTEM and USERS tablespaces online. 
    • C、Shut down the database, restore the two data files, start up the database in MOUNT mode, recover the two data files, and then alter the database open. 
    • D、Take the SYSTEM and USERS tablespaces offline, recover the two datafiles and then bring the SYSTEM and USERS tablespaces online.

    正确答案:C

  • 第6题:

    单选题
    Two data files have been deleted at the operating system level by accident. Your database is running in ARCHIVELOG mode and online backups are taken nightly. One of the data files that has been deleted belongs to the USERS tablespace on the other belongs to the SYSTEM tablespace. How can you recover from this situation?()
    A

    Shut down the database, restore the two data files and then start up the database. 

    B

    Take the system and users tablespace offline, restore the two data files, recover the two datafiles, and then bring the SYSTEM and USERS tablespaces online. 

    C

    Shut down the database, restore the two data files, start up the database in MOUNT mode, recover the two data files, and then alter the database open. 

    D

    Take the SYSTEM and USERS tablespaces offline, recover the two datafiles and then bring the SYSTEM and USERS tablespaces online.


    正确答案: B
    解析: 暂无解析

  • 第7题:

    单选题
    You work as a database administrator at Certkiller .com. Your production database uses an Automatic Storage Management (ASM) instance to manage its files. You want to add a new disk group to the ASM instance to manage the increased data load. What action would you perform to include the new disk group in the ASM instance without causing any impact on the currently connected users?()
    A

     mount the new disk group in the ASM instance

    B

     restart the ASM instance and the production database instance

    C

     register the new disk groups in the production database instance

    D

     restart the ASM instance without restarting the production database instance

    E

     include the new disk group in the ASM_DISKSTRING parameter in the parameter file and restart the ASM instance


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    You want to create a new optimized database for your transactional production environment to be used by a financial application. While creating the database, you want the Oracle software to take care of all basic settings to optimize the database performance. Which method would you use to achieve this objective?()
    A

    Use the CREATE DATABASE .. command to create the database with Oracle-managed files. 

    B

    Use the Database Configuration Assistant (DBCA) to create the database with Oracle-managed files. 

    C

    Use Enterprise Manager to create a new database with the Online Transaction Processing (OLTP) option. 

    D

    Use Database Configuration Assistant (DBCA) to create the database with Transaction Processing template. 

    E

    Use the CREATE DATABASE .. command to create the database with Automatic Storage Management (ASM) file system.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Due to media failure you lost one of the data files belonging to the USERS tablespace, and the tablespace is not available to use. Which statement regarding the status of the database is true?()
    A

    The database remains open.

    B

    The database gets dismounted.

    C

    The database becomes read only.

    D

    The database instance gets aborted.

    E

    The database gets shut down automatically.

    F

    The status of the database depends on the status of the USERS tablespace.


    正确答案: F
    解析: 暂无解析

  • 第10题:

    单选题
    Your production database uses an Automatic Storage Management (ASM) instance to manage its files. You want to add a new disk group to the ASM instance to manage the increased data load. What action would you perform to include the new disk group in the ASM instance without causing any impact on the currently connected users?()
    A

    mount the new disk group in the ASM instance

    B

    restart the ASM instance and the production database instance

    C

    register the new disk groups in the production database instance

    D

    restart the ASM instance without restarting the production database instance

    E

    include the new disk group in the ASM_DISKSTRING parameter in the parameter file and restart the ASM instance


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    In your production database you want to use an Automatic Storage Management (ASM) instance to manage the database files. Which option would you use to migrate the database files from a non-ASM instance to an ASM instance?()
    A

    Oracle Migration Assistant

    B

    Recovery Manager (RMAN)

    C

    Oracle Data Pump Export and Import

    D

    conventional Oracle Export and Import

    E

    operating system utilities to copy the files to the ASM instance


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    In your Supportcenter.cn production database,you find that the database users are able to create and read files with unstructured data,available in any location on the host machine from an application. You want to restrict the database users to access files in a specific location on the host machine. What could do to achieve this?()
    A

    Modify the value for the UTL_FILE_DIR parameter in the parameter file

    B

    Grant read and write privilege on the operating system path to the database users

    C

    Modify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter file

    D

    Modify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter file

    E

    Create a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users


    正确答案: A
    解析: 暂无解析

  • 第13题:

    You want to create a new optimized database for your transactional production environment to be used by a financial application. While creating the database, you want the Oracle software to take care of all basic settings to optimize the database performance. Which method would you use to achieve this objective?()

    • A、Use the CREATE DATABASE .. command to create the database with Oracle-managed files. 
    • B、Use the Database Configuration Assistant (DBCA) to create the database with Oracle-managed files. 
    • C、Use Enterprise Manager to create a new database with the Online Transaction Processing (OLTP) option. 
    • D、Use Database Configuration Assistant (DBCA) to create the database with Transaction Processing template. 
    • E、Use the CREATE DATABASE .. command to create the database with Automatic Storage Management (ASM) file system.

    正确答案:D

  • 第14题:

    Due to media failure you lost one of the data files belonging to the USERS tablespace, and the tablespace is not available to use. Which statement regarding the status of the database is true?()

    • A、The database remains open.
    • B、The database gets dismounted.
    • C、The database becomes read only.
    • D、The database instance gets aborted.
    • E、The database gets shut down automatically.
    • F、The status of the database depends on the status of the USERS tablespace.

    正确答案:A

  • 第15题:

    In your Supportcenter.cn production database,you find that the database users are able to create and read files with unstructured data,available in any location on the host machine from an application. You want to restrict the database users to access files in a specific location on the host machine. What could do to achieve this?()

    • A、Modify the value for the UTL_FILE_DIR parameter in the parameter file
    • B、Grant read and write privilege on the operating system path to the database users
    • C、Modify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter file
    • D、Modify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter file
    • E、Create a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users

    正确答案:A

  • 第16题:

    There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow.  There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()

    • A、Only bring the tablespace back online.
    • B、Only recover the tablespace and then bring the tablespace back online.
    • C、Shut down the database, recover the data file and then start up the database.
    • D、Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.
    • E、Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.

    正确答案:D

  • 第17题:

    You are the administrator of a Windows 2000 network.  You upgrade five computers in the sales department to Windows 2000 Professional. You then apply the Basicwk.inf security template to the upgraded computers. The remaining computers in the sales department are using Windows NT Workstation 4.0. When users log on to the Windows 2000 Professional computers they report that they are unable to run the company’s database application.  When the users log on to Windows NT Workstation 4.0 computers they are able to run the database application.  You want the users of Windows 2000 Professional computers to be able to run the database application.  What should you do? ()

    • A、Apply the Securews.inf security template to the computers.
    • B、Apply the Compatsws.inf security template to the computers.
    • C、Delete the Basicwk.inf security template file from the computers.
    • D、For each user account, grant Read permission to the database application and its associated files.
    • E、Use the System Policy Editor to configure a new security policy for the database application.

    正确答案:B

  • 第18题:

    单选题
    You are the administrator of a Windows 2000 network.  You upgrade five computers in the sales department to Windows 2000 Professional. You then apply the Basicwk.inf security template to the upgraded computers. The remaining computers in the sales department are using Windows NT Workstation 4.0. When users log on to the Windows 2000 Professional computers they report that they are unable to run the company’s database application.  When the users log on to Windows NT Workstation 4.0 computers they are able to run the database application.  You want the users of Windows 2000 Professional computers to be able to run the database application.  What should you do? ()
    A

    Apply the Securews.inf security template to the computers.

    B

    Apply the Compatsws.inf security template to the computers.

    C

    Delete the Basicwk.inf security template file from the computers.

    D

    For each user account, grant Read permission to the database application and its associated files.

    E

    Use the System Policy Editor to configure a new security policy for the database application.


    正确答案: D
    解析: 暂无解析

  • 第19题:

    单选题
    In Recovery Manager (RMAN), you are taking image copies of the data files of your production database and rolling them forward at regular intervals. You attempt to restart your database. After a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the data file by using the image copy. Because a media failure caused the data file to be damaged, you want to place the d ata file in a different location while restoring the file. Which option must you consider for this task?()
    A

    using only the RMAN SWITCH command to set the new location for the data file

    B

    placing the database in the MOUNT state for the restore and recovery operations.

    C

    using an RMAN RUN block with the SET NEWNAME and then the SWITCH command.

    D

    configuring two channels: one for the restore operation and the other for the recovery operation


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()
    A

    It is a list of remote database links stored in the XML file that are available to the users of the database.

    B

    It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.

    C

    It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.

    D

    It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    In your Certkiller .com production database, you find that the database users are able to create and read files with unstructured data, available in any location on the host machine from an application.  You want to restrict the database users to access files in a specific location on the host machine.  What could do to achieve this?()
    A

    Modify the value for the UTL_FILE_DIR parameter in the parameter file

    B

    Grant read and write privilege on the operating system path to the database users

    C

    Modify the value for the LDAP_DIRECTORY_ACCESS parameter in the parameter file

    D

    Modify the value for the PLSQL_NATIVE_LIBRARY_DIR parameter in the parameter file

    E

    Create a directory object referring to the operating system path, and grant read and write privilege on the directory object to the database users


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    In Recovery Manager (RMAN), you are taking image copies of the data files of your production database and rolling them forward at regular intervals. You attempt to restart your database. After a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the data file by using the image copy. Because a media failure caused the data file to be damaged, you want to place the data file in a different location while restoring the file. Which option must you consider for this task?()
    A

    using only the RMAN SWITCH command to set the new location for the data file

    B

    placing the database in the MOUNT state for the restore and recovery operations.

    C

    using an RMAN RUN block with the SET NEWNAME and then the SWITCH command.

    D

    configuring two channels: one for the restore operation and the other for the recovery operation


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    There is a problem with one of the disks used for your database and your system administrator informs you that the disk needs to be replaced. The replacement disk will not be available until tomorrow.  There was only one data file on this disk; it belongs to the USERS tablespace in your PROD database. Your PROD database runs in ARCHIVELOG mode and nightly online backups are taken. The users need to be able to access the data in the USERS tablespace before the replacement disk arrives. You have already taken the USERS tablespace offline and have restored the data file from last night’s backup to a new disk. Which additional steps are required in order to make the USERS tablespace available?()
    A

    Only bring the tablespace back online.

    B

    Only recover the tablespace and then bring the tablespace back online.

    C

    Shut down the database, recover the data file and then start up the database.

    D

    Issue the ALTER DATABASE RENAME FILE command, recover the tablespace, and then bring the tablespace online.

    E

    Recover the tablespace, issue the ALTER DATABASE RENAME FILE command, and then bring the tablespace online.


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()
    A

     It is a list of remote database links stored in the XML file that are available to the users of the database.

    B

     It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.

    C

     It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.

    D

     It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.


    正确答案: D
    解析: 暂无解析