zoukankan      html  css  js  c++  java
  • 052(十)

    46、

    46.A user, who is authenticated externally, logs in to a remote machine and connects to the database instance. 
    What action would you take to ensure that a user cannot connect to the database instance by merely logging in to a remote machine? 
    A. Set REMOTE_OS_ROLES to FALSE  
    B. Set OS_ROLES parameter to FALSE 
    C. Set the REMOTE_OS_AUTHENT parameter to FALSE 
    D. Set the REMOTE_LOGIN_PASSWORD_FILE parameter to NONE
    Answer: C
    
    REMOTE_OS_AUTHENT 限制远程数据库验证,默认为false
    View Code

    47、

    47.Which two statements are true about setting the FAST_START_MTTR_TARGET initialization parameter to a nonzero value? (Choose two.) 
    A. The MTTR advisor will be disabled 
    B. Automatic checkpoint tuning will be enabled 
    C. The value for the LOG_CHECKPOINT_INTERVAL initialization parameter will be override the value for FAST_START_MTTR_TARGET 
    D. The time taken to recover the instance after the crash is always exactly the same as the value given for the FAST_START_MTTR_TARGET initialization parameter
    Answer: BC
    
    FAST_START_MTTR_TARGETmust be set to a nonzero value if the STATISTICS_LEVEL parameter is dynamically modifiedto turn MTTR advisory on
    
    
    FAST_START_MTTR_TARGETenables you to specify the number of seconds the database 
    takes to perform crash recovery of a single instance. When specified, FAST_START_
    MTTR_TARGETis overridden by LOG_CHECKPOINT_INTERVAL.
    View Code

    48、

    48.You want to create a role to meet these requirements: 
    1. The role is to be protected from unauthorized usage. 
    2. The password of the role is not to be embedded in the application source code or stored in a table. 
    Which method would you use to restrict enabling of such roles? 
    A. Create the role with external authentication. 
    B. Create the role as a secure application role. 
    C. Create the role as a password-protected role. 
    D. Create a role and use Fine-Grained Access Control (FGAC) to secure the role. 
    Answer: B
    
    安全应用角色
    1.可以解决其他客户端程序越权访问数据的问题。
    2.比隐藏密码机制更好。
    3.使用SYS_CONTEXT机制和VPD效果一样。
    4.启用角色时通过包,而不是通过密码。
    View Code

    49、View the Exhibit and identify the component marked with a mark. 

    A. Checkpoint (CKPT)
    B. Process Monitor (PMON)
    C. Archiver Processes (ARcn)
    D. Recoverer Process (RECO)
    E. Memory Manager Process (MMAN)

    Answer: A
    View Code

    50、

    50.Note the following points describing various utilities in Oracle Database 11g: 
    1. It enables the transfer of data from one database to another 
    2. It provides a complete solution for the backup, restoration and recovery needs of the entire database 
    3. It enables the loading of data from an external file into tables of an Oracle Database 
    4. It provides a tape backup management for the Oracle ecosystem 
    Which point describes the Oracle Data Pump utility? 
    A. 1 
    B. 2 
    C. 3 
    D. 4 
    E. 1 and 3 
    F. 1, 2, 3 and 4 
    Answer: A 
    View Code
  • 相关阅读:
    Windows server 2008 R2远程桌面授权破解方法
    微软 windows server 2019 中文版 原版iso镜像下载地址及密钥
    Everything——支持快速搜索文件夹
    相对路径(根目录、当前目录、上级目录)
    LinkShellExtension (软连接、硬连接、符号连接)工具教程
    oracle 获取表信息
    python3.6 安装 pycrypto
    项目问题记录
    Django得缓存
    Django得信号
  • 原文地址:https://www.cnblogs.com/huanhuanang/p/5343742.html
Copyright © 2011-2022 走看看