Create the role with global authentication.
Create the role with external authentication.
Create the role as a secure application role.
Create the role as a password-protected role.
Create a role and use Fine-Grained Access Control (FGAC) to secure the role.
第1题:
You have the following requirements: - Ensure that the business tier can be updated without affecting the application tier. - Use the minimum role instance size that meets or exceeds the current server specifications. You need to recommend a topology for hosting the application in Windows Azure. What should you recommend?()
第2题:
You work as an application developer at Contoso.com. You use Microsoft .NET Framework 3.5 and Microsoft ADO.NET to develop an application. The user name and password that is kept by the connection string is stored directly in the code of the application. You want to make sure that the password in the connection string is as protected. What should you do? ()
第3题:
You want to create a role to meet these requirements: 1:The role is to be protected from unauthorized usage. 2:The password of the role is not to be embedded in the application source code or stored in a table. Which method would you use to restrict enabling of such roles()
第4题:
You have been asked to create three users, PUB1, PUB2 and PUB3, for three newly hired employees and to allocate unlimited quota on their default tablespace PUBLISHER_TBS with no other privileges. After creating the users, which method can you use for granting the required privileges?()
第5题:
You are designing a Windows Azure web application that does not use ASP.NET. The application requires a standalone Win32 interpreter. You need to recommend an approach for allowing access to the interpreter. What should you recommend?()
第6题:
You are adatabase developer. You develop atask management application that connect stoa SQLServer 2008 database named TaskDB.Users logon to the application by using a SQLServer login. The application contains amodule named Task that assigns tasks tousers. Information about the setasks is stored in the Tasks table of the TaskDB data base. The Tasks table contains multiple columns. These include the Close Dateand Estimated Timecolumns. The application must meet the following security requirements: Users assigned toad atabase role named User 1 canupd ate all task information columns except the Close Date and the Estimated Time columns in the Tasks table. Administrative users assigned toad atabase role named Task_Admin canupd ateall task information in the Tasks table.You needto design a strategy to meet the security requirements. Which two actions should you perform?()
第7题:
Use a web role. Configure the interpreter as an ISAPI filter.
Use a web role. Configure a FastCGI handler for the interpreter and set the path to the interpreter.
Use a worker role with an internal endpoint. Enable native code execution.
Use a worker role with an external endpoint. Configure a FastCGI handler for the interpreter and set the path to the root.
第8题:
Deploy the application tier and the business tier to one role with two Medium instances.
Deploy the application tier and the business tier to one role with two Large instances.
Deploy the application tier role to a Medium instance. Deploy the business tier role to a medium instance.
Deploy the application tier role to a Large instance. Deploy the business tier role to a Large instance.
第9题:
Set up vertical partitioning.
Set up horizontal partitioning.
Increase the number of role instances.
Change the role instance size to large.
第10题:
grant CONNECT role to all of the three users
grant RESOURCE role to all of the three users
grant both CONNECT and RESOURCE role to all of the three users
execute ALTER USER .. QUOTA UNLIMITED ON publisher_tbs command for all of the three users
create role with UNLIMITED TABLESPACE system privilege and assign the role to all of the three users
第11题:
Create the role with external authentication.
Create the role as a secure application role.
Create the role as a password-protected role.
Create a role and use Fine-Grained Access Control (FGAC) to secure the role
第12题:
Create the role with global authentication.
Create the role with external authentication.
Create the role as a secure application role.
Create the role as a password-protected role.
Create a role and use Fine-Grained Access Control (FGAC) to secure the role.
第13题:
On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()
第14题:
You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()
第15题:
You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()
第16题:
Examine the code: CREATE ROLE readonly IDENTIFIES USING app.chk_readwrite ; CREATE ROLE readwrite IDENTIFIED USING app.chk_readwrite ; CREATE OR REPLACE PROCEDURE app.chk_readwrite AUTHID CURRENT_USER IS ipchk STRING(30); BEGIN IF sys_context(‘USERENV’,’ISDBA’)=’TRUE’ THEN DBMS_SESSION.SET_ROLE‘READWRITE’) ; ELSE DBMS_SESSION.SET_ROLE(‘READONLY’) ; END; / Which three statements correctly describe the Secure Application role definition?()
第17题:
You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()
第18题:
Create the role with external authentication.
Create the role as a secure application role.
Create the role as a password-protected role.
Create a role and use Fine-Grained Access Control (FGAC) to secure the role
第19题:
table
transactional trigger
stored procedure
FROM clause query
第20题:
user name
password length
certificate
Host Checker
第21题:
[PrincipalPermission (SecurityAction.Demand, Name = @BUILTIN/Administrators)]
[PrincipalPermission (SecurityAction.Demand, Role = @BUILTIN/Administrators)]
[PrincipalPermission (SecurityAction.Assert, Name = @BUILTIN/Administrators)]
[PrincipalPermission (SecurityAction.Assert, Role = @BUILTIN/Administrators)]
第22题:
Los Angeles
Paris
Sydney
Lisbon
Barcelona
第23题:
Los Angeles
Paris
Sydney
Lisbon
Barcelona
第24题:
Create a single queue. Send requests on the single queue.
Create a queue for each web role. Send requests on all queues at the same time.
Create a queue for each workerrole instance. Send requests on each worker queue in a round robin.
Create a queue for each combination of web roles and worker role instances. Send requests to all worker role instances based on the sending web role.