The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups
第1题:
第2题:
Which statement about OSPF authentication is true?()
第3题:
Which description about asymmetric encryption algorithms is correct?()
第4题:
Which two statements about OSPF IPv6 routing are true?()
第5题:
Which two statements regarding asymmetric key encryption are true?()
第6题:
Which two statements are true about encrypting RMAN backup?()
第7题:
Which two statements are true about encrypting RMAN backup?() (Choose two.)
第8题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第9题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第10题:
They use the same key for encryption and decryption of data.
They use different keys for decryption but the same key for encryption of data.
They use different keys for encryption and decryption of data.
They use the same key for decryption but different keys for encryption of data.
第11题:
the two methods of authentication using the WEP encryption are open and shared key
the 802.11 standard defines WEP security using 128-bit keys
WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
WEP is a scalable encryption solution that uses static keys for authentication
WEP security provides only one-way authentication
WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism
第12题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.
第13题:
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()
第14题:
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. The company stores clients data in DB1. Clients can access their profile data by using a Web application. You must ensure the security of the customer data, you must ensure that even if the backup media is lost, data files, log files and subsequent backups and so on are quite safe. So what action should you perform to achieve this goal?()
第15题:
Which two wireless security statements are true?()
第16题:
Which two statements regarding symmetric key encryption are true?() (Choose two.)
第17题:
Examine the following RMAN command:RMAN> CONFIGURE ENCRYPTION FOR DATABASE ON;RMAN> BACKUP DATABASE PLUS ARCHIVELOG;Which prerequisite must be met before accomplishing the backup?()
第18题:
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. VIP customer data of the company are stored in DB1. The customers access their profile data by using a Web application. You must ensure the security of the customer data, that is to say, even if the backup media is lost, you must guarantee that data files, log files and subsequent backups and so on are as safe as possible. So what action should you perform to achieve this goal?()
第19题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption
第20题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups
第21题:
It requires OSPF version 3.
automatically detects neighbors over NHMA interfaces
It supports encryption using
It uses LSA type 9
It uses LSA type 8
第22题:
A TACACS+ server is required to implement 802.1x.
MIC protects against man-in-the-middle and replay attacks.
The 802.1x standard provides encryption services for wireless clients.
The AES (symmetric block cipher) is specified in the IEEE 802.11i specification.
The IEEE 802.11i specification uses RC4 as its encryption mechanism.
WPA requires TKIP and AES as encryption methods.
第23题:
Provide a password for the encryption
Set up an Oracle wallet for the encryption
No setup is required as it is a default encryption method
Both Oracle wallet and password must be set up for the encryption
第24题:
WPA is based on the outdated IEEE 802.11i standard.
WPA uses RSN,which uses the same base encryption algorithm as RC4.
WPA requires a hardware upgrade that may not be supported by all vendors.
WPA uses TKIP,which uses the same base encryption algorithm as WEP.
WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
WPA is susceptible to a security weakness when preshared keys are used.