多选题A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the

题目
多选题
A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()
A

A custom logo on the user interface page

B

A maximum timeout value of 600 minutes

C

A maximum time out value of 1200 minutes

D

A default Juniper Networks logo on the user interface page


相似考题
更多“多选题A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the ”相关问题
  • 第1题:

    A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page.Based on the merging of these two roles, which two will be applied?()

    A. A custom logo on the user interface page

    B. A maximum timeout value of 600 minutes

    C. A maximum time out value of 1200 minutes

    D. A default Juniper Networks logo on the user interface page


    参考答案:C, D

  • 第2题:

    When adding a new user and assigning a role, which user role has "read only" rights to theconfiguration and operational states? ()

    • A、user
    • B、read_only
    • C、target_operator
    • D、security_operator

    正确答案:A

  • 第3题:

    You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()

    • A、The user cannot use the role at all.
    • B、The role would not be granted to the user.
    • C、The user needs to enable the role explicitly.
    • D、The user can start using the role immediately.
    • E、The user would have the admin option for the role.

    正确答案:C

  • 第4题:

    You are designing a Windows Azure application.  The application includes a web role and a worker role that communicate by using a Windows Azure Queue.  The worker role processes each message within 10 seconds of retrieving it from the queue. The worker role must process each message exactly one time.  If a process does not complete, the worker role must reprocess the message.  You need to recommend an approach for the worker role to manage messages in the queue.  What should you recommend?()

    • A、 Process the message and then delete it from the queue.
    • B、 Delete the message from the queue when retrieving the message.
    • C、 Set the visibility timeout of the message to 1 when retrieving the message.
    • D、 Process the message and then set the visibility timeout of themessage to the maximum value.

    正确答案:A

  • 第5题:

    You are customizing the user interface options for the finance department in your organization. Users in the department are able to see a session counter on the Web interface of the Junos Pulse Access Control Service. The CFO is unable to see the session counter.Which explanation would cause this behavior?()

    • A、The CFO is mapped to the finance role, but the session counter was enabled prior to the role mapping.
    • B、The CFO is mapped to the finance role, but the session counter was enabled after the role mapping.
    • C、The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role first, which does not have the session counter enabled.
    • D、The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role last, which does not have the session counter enabled.

    正确答案:C

  • 第6题:

    An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()

    • A、Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.
    • B、Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.
    • C、Ensure that merge roles is selected in the role-mapping rules.
    • D、Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.

    正确答案:D

  • 第7题:

    The DBA is defining role for users. Which of the following is not an acceptable method for defining a default role?()

    • A、ALTER USER DEFAULT ROLE ALL
    • B、ALTER USER DEFAULT ROLE ALL EXCEPT ROLE_1
    • C、ALTER USER DEFAULT ROLE NONE
    • D、ALTER USER DEFAULT ROLE NONE EXCEPT ROLE_1

    正确答案:D

  • 第8题:

    TestKing.com has a SQL Server 2005 computer. You have been assigned the task of retrieving information about a user who is currently logged in. You need to create a function that returns scalar information about the activity time for a particular user. What are two possible ways to achieve this goal?()

    • A、Create a function that returns a list of values that represent the login times for the given user.
    • B、Create a function that returns a list of values that represent the people who have logged more hours than the current user has logged.
    • C、Create a function that returns a numeric value that represents the number of hours that a user has logged for the current day.
    • D、Create a function that returns a numeric value that represents the number of hours that a user has logged for the current month.

    正确答案:C,D

  • 第9题:

    单选题
    View the Exhibit and examine the privileges granted to the MGR_ROLE role. The user SKD has been grantedthe CONNECT and RESOURCE roles only. The database administrator (DBA) grants MGR_ROLE to the userSKD by executing the command: SQL> GRANT MGR_ROLE TO SKD WITH ADMIN OPTION;  Which statement is true about the user SKD afterhe/she is granted this role()
    A

    The user SKD can grant only the MGR_ROLE role to other users, but not the privileges in it.

    B

    The user SKD can revoke the MGR_ROLE only from the users for whom he/she is the grantor.

    C

    The user SKD can grant the privileges in the MGR_ROLE role to other users, but not with ADMIN OPTION.

    D

    The user SKD can grant the privileges in the MGR_ROLE role to other users, but cannot revoke privilegesfrom them


    正确答案: C
    解析: 暂无解析

  • 第10题:

    多选题
    A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()
    A

    Perform a policy trace for the specific user and review the output to isolate the problem.

    B

    Review the Events log.

    C

    Review the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.

    D

    Review the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.


    正确答案: B,D
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements accurately describe a role?()
    A

    A role can be given to a maximum of 1000 users.

    B

    A user can have access to a maximum of 10 roles.

    C

    A role can have a maximum of 100 privileges contained in it.

    D

    Privileges are given to a role by using the CREATE ROLE statement.

    E

    A role is a named group of related privileges that can be granted to the user.

    F

    A user can have access to several roles, and several users can be assigned the same role.


    正确答案: E,A
    解析: 暂无解析

  • 第12题:

    多选题
    A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()
    A

    A custom logo on the user interface page

    B

    A maximum timeout value of 600 minutes

    C

    A maximum time out value of 1200 minutes

    D

    A default Juniper Networks logo on the user interface page


    正确答案: D,C
    解析: 暂无解析

  • 第13题:

    When adding a new user and assigning a role, which user role has "read only" rights to theconfiguration and operational states? ()

    A.user

    B.read_only

    C.target_operator

    D.security_operator


    参考答案:A

  • 第14题:

    A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()

    • A、A custom logo on the user interface page
    • B、A maximum timeout value of 600 minutes
    • C、A maximum time out value of 1200 minutes
    • D、A default Juniper Networks logo on the user interface page

    正确答案:C,D

  • 第15题:

    A web application uses the HttpSession mechanism to determine if a user is “logged in”. When a user supplies a valid user name and password, an HttpSession is created for that user.  The user has access to the application for only 15 minutes after logging in. The code must determine how long the user has been logged in, and if this time is greater than 15 minutes, must destroy the HttpSession.  Which method in HttpSession is used to accomplish this?()

    • A、 getCreationTime
    • B、 invalidateAfter
    • C、 getLastAccessedTime
    • D、 getMaxInactiveInterval

    正确答案:A

  • 第16题:

    A web application uses the HttpSession mechanism to determine if a user is "logged in." When a usersupplies a valid user name and password, an HttpSession is created for that user. The user has access tothe application for only 15 minutes after logging in. The code must determine how long the user has beenlogged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()

    • A、Getcreationtime
    • B、Invalidateafter
    • C、Getlastaccessedtime
    • D、Getmaxinactiveinterval

    正确答案:A

  • 第17题:

    What is the default session timeout for TCP sessions?()

    • A、1 minute
    • B、15 minutes
    • C、30 minutes
    • D、90 minutes

    正确答案:C

  • 第18题:

    A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()

    • A、Perform a policy trace for the specific user and review the output to isolate the problem.
    • B、Review the Events log.
    • C、Review the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.
    • D、Review the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.

    正确答案:A,D

  • 第19题:

    Which two statements accurately describe a role?()

    • A、A role can be given to a maximum of 1000 users.
    • B、A user can have access to a maximum of 10 roles.
    • C、A role can have a maximum of 100 privileges contained in it.
    • D、Privileges are given to a role by using the CREATE ROLE statement.
    • E、A role is a named group of related privileges that can be granted to the user.
    • F、A user can have access to several roles, and several users can be assigned the same role.

    正确答案:E,F

  • 第20题:

    单选题
    You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()
    A

    The user cannot use the role at all.

    B

    The role would not be granted to the user.

    C

    The user needs to enable the role explicitly.

    D

    The user can start using the role immediately.

    E

    The user would have the admin option for the role.


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    You are customizing the user interface options for the finance department in your organization. Users in the department are able to see a session counter on the Web interface of the Junos Pulse Access Control Service. The CFO is unable to see the session counter.Which explanation would cause this behavior?()
    A

    The CFO is mapped to the finance role, but the session counter was enabled prior to the role mapping.

    B

    The CFO is mapped to the finance role, but the session counter was enabled after the role mapping.

    C

    The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role first, which does not have the session counter enabled.

    D

    The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role last, which does not have the session counter enabled.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    In your database, you want to ensure that idle sessions that are blocking active are automatically terminated after a specified period of time. How would you accomplish this?()
    A

    Setting a metric threshold

    B

    Implementing Database Resource Manager

    C

    Enabling resumable timeout for user sessions

    D

    Decreasing the value of the IDLE_TIME resource limit in the default profile


    正确答案: D
    解析: 暂无解析

  • 第23题:

    多选题
    TestKing.com has a SQL Server 2005 computer. You have been assigned the task of retrieving information about a user who is currently logged in. You need to create a function that returns scalar information about the activity time for a particular user. What are two possible ways to achieve this goal?()
    A

    Create a function that returns a list of values that represent the login times for the given user.

    B

    Create a function that returns a list of values that represent the people who have logged more hours than the current user has logged.

    C

    Create a function that returns a numeric value that represents the number of hours that a user has logged for the current day.

    D

    Create a function that returns a numeric value that represents the number of hours that a user has logged for the current month.


    正确答案: D,A
    解析: 暂无解析