zoukankan      html  css  js  c++  java
  • 052(十)

    46、

    46.A user, who is authenticated externally, logs in to a remote machine and connects to the database instance. 
    What action would you take to ensure that a user cannot connect to the database instance by merely logging in to a remote machine? 
    A. Set REMOTE_OS_ROLES to FALSE  
    B. Set OS_ROLES parameter to FALSE 
    C. Set the REMOTE_OS_AUTHENT parameter to FALSE 
    D. Set the REMOTE_LOGIN_PASSWORD_FILE parameter to NONE
    Answer: C
    
    REMOTE_OS_AUTHENT 限制远程数据库验证,默认为false
    View Code

    47、

    47.Which two statements are true about setting the FAST_START_MTTR_TARGET initialization parameter to a nonzero value? (Choose two.) 
    A. The MTTR advisor will be disabled 
    B. Automatic checkpoint tuning will be enabled 
    C. The value for the LOG_CHECKPOINT_INTERVAL initialization parameter will be override the value for FAST_START_MTTR_TARGET 
    D. The time taken to recover the instance after the crash is always exactly the same as the value given for the FAST_START_MTTR_TARGET initialization parameter
    Answer: BC
    
    FAST_START_MTTR_TARGETmust be set to a nonzero value if the STATISTICS_LEVEL parameter is dynamically modifiedto turn MTTR advisory on
    
    
    FAST_START_MTTR_TARGETenables you to specify the number of seconds the database 
    takes to perform crash recovery of a single instance. When specified, FAST_START_
    MTTR_TARGETis overridden by LOG_CHECKPOINT_INTERVAL.
    View Code

    48、

    48.You want to create a role to meet these requirements: 
    1. The role is to be protected from unauthorized usage. 
    2. The password of the role is not to be embedded in the application source code or stored in a table. 
    Which method would you use to restrict enabling of such roles? 
    A. Create the role with external authentication. 
    B. Create the role as a secure application role. 
    C. Create the role as a password-protected role. 
    D. Create a role and use Fine-Grained Access Control (FGAC) to secure the role. 
    Answer: B
    
    安全应用角色
    1.可以解决其他客户端程序越权访问数据的问题。
    2.比隐藏密码机制更好。
    3.使用SYS_CONTEXT机制和VPD效果一样。
    4.启用角色时通过包,而不是通过密码。
    View Code

    49、View the Exhibit and identify the component marked with a mark. 

    A. Checkpoint (CKPT)
    B. Process Monitor (PMON)
    C. Archiver Processes (ARcn)
    D. Recoverer Process (RECO)
    E. Memory Manager Process (MMAN)

    Answer: A
    View Code

    50、

    50.Note the following points describing various utilities in Oracle Database 11g: 
    1. It enables the transfer of data from one database to another 
    2. It provides a complete solution for the backup, restoration and recovery needs of the entire database 
    3. It enables the loading of data from an external file into tables of an Oracle Database 
    4. It provides a tape backup management for the Oracle ecosystem 
    Which point describes the Oracle Data Pump utility? 
    A. 1 
    B. 2 
    C. 3 
    D. 4 
    E. 1 and 3 
    F. 1, 2, 3 and 4 
    Answer: A 
    View Code
  • 相关阅读:
    VB.Net计算含日文的字符串长度
    修改三个属性,就可以让错误提示更详细
    ORACLE分页查询SQL语法
    探知主力仓位的原理
    Linux手机研发五大难关
    当SNS在垂直行业嫁接电子商务
    实时股票数据获取方式
    商业周刊:网民周末更爱移动Web 分类信息超社交
    Linux下的C编程实战
    想起了赵丹阳
  • 原文地址:https://www.cnblogs.com/huanhuanang/p/5343742.html
Copyright © 2011-2022 走看看