zoukankan      html  css  js  c++  java
  • 052(十)

    46、

    46.A user, who is authenticated externally, logs in to a remote machine and connects to the database instance. 
    What action would you take to ensure that a user cannot connect to the database instance by merely logging in to a remote machine? 
    A. Set REMOTE_OS_ROLES to FALSE  
    B. Set OS_ROLES parameter to FALSE 
    C. Set the REMOTE_OS_AUTHENT parameter to FALSE 
    D. Set the REMOTE_LOGIN_PASSWORD_FILE parameter to NONE
    Answer: C
    
    REMOTE_OS_AUTHENT 限制远程数据库验证,默认为false
    View Code

    47、

    47.Which two statements are true about setting the FAST_START_MTTR_TARGET initialization parameter to a nonzero value? (Choose two.) 
    A. The MTTR advisor will be disabled 
    B. Automatic checkpoint tuning will be enabled 
    C. The value for the LOG_CHECKPOINT_INTERVAL initialization parameter will be override the value for FAST_START_MTTR_TARGET 
    D. The time taken to recover the instance after the crash is always exactly the same as the value given for the FAST_START_MTTR_TARGET initialization parameter
    Answer: BC
    
    FAST_START_MTTR_TARGETmust be set to a nonzero value if the STATISTICS_LEVEL parameter is dynamically modifiedto turn MTTR advisory on
    
    
    FAST_START_MTTR_TARGETenables you to specify the number of seconds the database 
    takes to perform crash recovery of a single instance. When specified, FAST_START_
    MTTR_TARGETis overridden by LOG_CHECKPOINT_INTERVAL.
    View Code

    48、

    48.You want to create a role to meet these requirements: 
    1. The role is to be protected from unauthorized usage. 
    2. The password of the role is not to be embedded in the application source code or stored in a table. 
    Which method would you use to restrict enabling of such roles? 
    A. Create the role with external authentication. 
    B. Create the role as a secure application role. 
    C. Create the role as a password-protected role. 
    D. Create a role and use Fine-Grained Access Control (FGAC) to secure the role. 
    Answer: B
    
    安全应用角色
    1.可以解决其他客户端程序越权访问数据的问题。
    2.比隐藏密码机制更好。
    3.使用SYS_CONTEXT机制和VPD效果一样。
    4.启用角色时通过包,而不是通过密码。
    View Code

    49、View the Exhibit and identify the component marked with a mark. 

    A. Checkpoint (CKPT)
    B. Process Monitor (PMON)
    C. Archiver Processes (ARcn)
    D. Recoverer Process (RECO)
    E. Memory Manager Process (MMAN)

    Answer: A
    View Code

    50、

    50.Note the following points describing various utilities in Oracle Database 11g: 
    1. It enables the transfer of data from one database to another 
    2. It provides a complete solution for the backup, restoration and recovery needs of the entire database 
    3. It enables the loading of data from an external file into tables of an Oracle Database 
    4. It provides a tape backup management for the Oracle ecosystem 
    Which point describes the Oracle Data Pump utility? 
    A. 1 
    B. 2 
    C. 3 
    D. 4 
    E. 1 and 3 
    F. 1, 2, 3 and 4 
    Answer: A 
    View Code
  • 相关阅读:
    WeakHashMap、IdentityHashMap 、EnumMap简单了解——高淇JAVA300讲笔记之其他Map实现类
    Properties简介——高淇JAVA300讲笔记之Hashtable
    简单实现一个自定义的HashMap——高淇JAVA300讲笔记之HashMap
    简单实现一个自定义的HashSet——高淇JAVA300讲笔记之HashSet
    Enumeration接口——高淇JAVA300讲笔记之其他容器
    Queue接口——高淇JAVA300讲笔记之其他容器
    Collections类的常用方法——高淇JAVA300讲笔记之Collections类
    排序容器——高淇JAVA300讲笔记之TreeSet与TreeMap
    类的引用类型成员
    CentOS5.4下安装codeblocks 12.11
  • 原文地址:https://www.cnblogs.com/huanhuanang/p/5343742.html
Copyright © 2011-2022 走看看