单选题Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A The database user must be created using DB2 Control Center.B The database user must be created u

题目
单选题
Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
A

The database user must be created using DB2 Control Center.

B

The database user must be created using the DB2 Command Line Processor.

C

The database user may be created using DB2 Control Center or DB2 Command Line Processor.

D

The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.


相似考题
更多“单选题Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()A The database user must be created using DB2 Control Center.B The database user must be created u”相关问题
  • 第1题:

    Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

    • A、to add second factor based authentication to a Web application
    • B、to pre-populate user wallets with all their application credentials in one go
    • C、to enhance out-of-the-box audit logging by creating custom audit log events
    • D、to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-On
    • E、to configure automatic password change on expiry for an application so that the new password is a random string of specified strength

    正确答案:A,B

  • 第2题:

    In your database instance, the user sessions are connected to the database server from the remote machines.You want to achieve the following for these users: 1. The user account must be locked after four unsuccessful login attempts. 2. The user must be prompted to change the password at regular intervals. 3. The user may not have more than three simultaneous sessions. 4. The user session must automatically be logged off if more than 10 minutes elapsed time used. How would you accomplish the above()

    • A、By assigning profiles for the users
    • B、By implementing Fine-Grained Auditing (FGA)
    • C、By granting a secure application role to the users
    • D、By implementing the Database Resource Manager plan

    正确答案:A

  • 第3题:

    You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()

    • A、The user cannot use the role at all.
    • B、The role would not be granted to the user.
    • C、The user needs to enable the role explicitly.
    • D、The user can start using the role immediately.
    • E、The user would have the admin option for the role.

    正确答案:C

  • 第4题:

    What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()

    • A、The directory must exist with one subdirectory (general).
    • B、The directory must exist with two subdirectories (daily, weekly).
    • C、The directory must exist with three subdirectories (daily, weekly, monthly).
    • D、The directory must exist with four subdirectories (general, daily, weekly, monthly).

    正确答案:C

  • 第5题:

    The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()

    • A、The user would not be able to log in to the wallet.
    • B、The user is able to log in with their wallet password, but the wallet is not synchronized with the server.
    • C、A user must be re-assigned to another policy template in order to change any aspects of the applied policy.
    • D、The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

    正确答案:B

  • 第6题:

    Which of the following is a characteristic of a schema?()

    • A、Foreign key references cannot cross schema boundaries.
    • B、A DB2 user must be created before a schema with the same name can be created.
    • C、If no schema is specified when an object is created, the default schema PUBLIC is used.
    • D、A schema enables the creation of multiple objects in a database without encountering namespace collisions.

    正确答案:D

  • 第7题:

    单选题
    Which step do you need to perform to enable a user with the SYSDBA privilege to log in as SYSDBA in iSQL*Plus?()
    A

    The user must be granted the database administrator (DBA) privilege.

    B

    The user must be listed in the password file for the authentication.

    C

    No special setup is needed for the user to connect as SYSDBA in iSQL*Plus.

    D

    Set up a user in the Oracle Application Server Containers for J2EE (OC4J) user manager,and grant the webDba role to the user.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    In your database instance, the user sessions are connected to the database server from the remote machines.You want to achieve the following for these users: 1. The user account must be locked after four unsuccessful login attempts. 2. The user must be prompted to change the password at regular intervals. 3. The user may not have more than three simultaneous sessions. 4. The user session must automatically be logged off if more than 10 minutes elapsed time used. How would you accomplish the above()
    A

    By assigning profiles for the users

    B

    By implementing Fine-Grained Auditing (FGA)

    C

    By granting a secure application role to the users

    D

    By implementing the Database Resource Manager plan


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()
    A

    The user cannot use the role at all.

    B

    The role would not be granted to the user.

    C

    The user needs to enable the role explicitly.

    D

    The user can start using the role immediately.

    E

    The user would have the admin option for the role.


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    Which statement is true about the database and database-user used during installation of IMS Server?()
    A

    A preexisting database user may be used but a new database has to be created during installation.

    B

    A preexisting database may be used but a new database user has to be created during installation.

    C

    A preexisting database and user may be used or a new database and user are created during installation.

    D

    A preexisting database and user cannot be used; a new database and user are created during  installation.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following is a characteristic of a schema?()
    A

    Foreign key references cannot cross schema boundaries.

    B

    A DB2 user must be created before a schema with the same name can be created.

    C

    If no schema is specified when an object is created, the default schema PUBLIC is used.

    D

    A schema enables the creation of multiple objects in a database without encountering namespace collisions.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    The database user must be created using DB2 Control Center.

    B

    The database user must be created using the DB2 Command Line Processor.

    C

    The database user may be created using DB2 Control Center or DB2 Command Line Processor.

    D

    The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which step do you need to perform to enable a user with the SYSDBA privilege to log in as SYSDBA in iSQL*Plus?()

    • A、The user must be granted the database administrator (DBA) privilege.
    • B、The user must be listed in the password file for the authentication.
    • C、No special setup is needed for the user to connect as SYSDBA in iSQL*Plus.
    • D、Set up a user in the Oracle Application Server Containers for J2EE (OC4J) user manager,and grant the webDba role to the user.

    正确答案:D

  • 第14题:

    You are working on a 24X7 database. You want to design a backup strategy for your database that uses user managed backups. You want to be able to perform all backups while the database remains online. Which statement about performing user-managed backups in a 24x7 environment is true?()

    • A、You must have change tracking enabled in your database
    • B、Your database must be running in NOARCHIVELOG mode
    • C、To back up a tablespace, it must be in backup mode
    • D、To back up a tablespace, it must first be taken offline

    正确答案:C

  • 第15题:

    Which statement is true about a DB2 user that is to be used as the database user for IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()

    • A、The database user must be created using DB2 Control Center.
    • B、The database user must be created using the DB2 Command Line Processor.
    • C、The database user may be created using DB2 Control Center or DB2 Command Line Processor.
    • D、The database user must be created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 IMS Installer.

    正确答案:C

  • 第16题:

    Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()

    • A、REVOKE ACCESS ON DATABASE FROM USER bob
    • B、REVOKE CONNECT ON DATABASE FROM USER tom
    • C、REVOKE tom FROM ACCESS ON DATABASE BY USER bob
    • D、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

    正确答案:B

  • 第17题:

    Which statement is true about the database and database-user used during installation of IMS Server?()

    • A、A preexisting database user may be used but a new database has to be created during installation.
    • B、A preexisting database may be used but a new database user has to be created during installation.
    • C、A preexisting database and user may be used or a new database and user are created during installation.
    • D、A preexisting database and user cannot be used; a new database and user are created during  installation.

    正确答案:C

  • 第18题:

    In your database instance, the user sessions are connected to the database server from the remotemachines. You want to achieve the following for these users:  1:The user account must be locked after four unsuccessful login attempts.PASSWORD_LOCK_TIME  2:The user must be prompted to change the password at regular intervals.PASSWORD_LIFE_TIME  3:The user may not have more than three simultaneous sessions.SESSIONS_PER_USER  4:The user session must automatically be logged off if more than 10 minutes elapsed time used.CONNECT_TIME  How would you accomplish the above()

    • A、by assigning profiles for the users
    • B、by implementing Fine-Grained Auditing (FGA)
    • C、by granting a secure application role to the users
    • D、by implementing the Database Resource Manager plan

    正确答案:A

  • 第19题:

    单选题
    Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()
    A

    REVOKE ACCESS ON DATABASE FROM USER bob

    B

    REVOKE CONNECT ON DATABASE FROM USER tom

    C

    REVOKE tom FROM ACCESS ON DATABASE BY USER bob

    D

    REVOKE tom FROM CONNECT ON DATABASE BY USER bob


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    In your database instance, the user sessions are connected to the database server from the remotemachines. You want to achieve the following for these users:  1:The user account must be locked after four unsuccessful login attempts.PASSWORD_LOCK_TIME  2:The user must be prompted to change the password at regular intervals.PASSWORD_LIFE_TIME  3:The user may not have more than three simultaneous sessions.SESSIONS_PER_USER  4:The user session must automatically be logged off if more than 10 minutes elapsed time used.CONNECT_TIME  How would you accomplish the above()
    A

    by assigning profiles for the users

    B

    by implementing Fine-Grained Auditing (FGA)

    C

    by granting a secure application role to the users

    D

    by implementing the Database Resource Manager plan


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    What are the directory details of Relational Database backup files created by IBM Tivoli Access Manager for Enterprise Single Sign-On V8.0.1 housekeeping?()
    A

    The directory must exist with one subdirectory (general).

    B

    The directory must exist with two subdirectories (daily, weekly).

    C

    The directory must exist with three subdirectories (daily, weekly, monthly).

    D

    The directory must exist with four subdirectories (general, daily, weekly, monthly).


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    You are working on a 24X7 database. You want to design a backup strategy for your database that uses user managed backups. You want to be able to perform all backups while the database remains online. Which statement about performing user-managed backups in a 24x7 environment is true?()
    A

    You must have change tracking enabled in your database

    B

    Your database must be running in NOARCHIVELOG mode

    C

    To back up a tablespace, it must be in backup mode

    D

    To back up a tablespace, it must first be taken offline


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()
    A

    The user would not be able to log in to the wallet.

    B

    The user is able to log in with their wallet password, but the wallet is not synchronized with the server.

    C

    A user must be re-assigned to another policy template in order to change any aspects of the applied policy.

    D

    The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.


    正确答案: D
    解析: 暂无解析

  • 第24题:

    多选题
    Which two situations necessitate integration of external systems with IBM Tivoli Access Manager for Enterprise Single Sign-On using API published by IBM Tivoli Access Manager for Enterprise Single Sign-On IMS Server?()
    A

    to add second factor based authentication to a Web application

    B

    to pre-populate user wallets with all their application credentials in one go

    C

    to enhance out-of-the-box audit logging by creating custom audit log events

    D

    to create reports from audit log trails collected by IBM Tivoli Access Manager for Enterprise Single Sign-On

    E

    to configure automatic password change on expiry for an application so that the new password is a random string of specified strength


    正确答案: B,C
    解析: 暂无解析