-
You are auditing some events on your Windows 2000 Professional computer. You make changes in the system time of this computer. Under what event will this log be generated in the event viewer? ()
A . Privilege Use
B . Object Use
C . Security Settings Use
D . System Use
-
You execute the following command to audit the database activities: SQL> AUDIT DROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL; What is the effect of this command?()
A . One audit record is created for the whole session if user SCOTT successfully drops one or more tables in his session.
B . One audit record is created for every session when any user successfully drops a table owned by SCOTT.
C . One audit record is created for each successful DROP TABLE command executed by any user to drop tables owned by SCOTT.
D . One audit record is generated for the session when SCOTT grants the DROP ANY TABLE privilege to other users in his session.
E . One audit record is created for each successful DROP TABLE command executed in the session of SCOTT.
-
You are developing a Windows Communication Foundation (WCF) service. You need to enable security auditing for all events. What should you do?()
A . Set the serviceAuthorizationAuditLevel setting to Success and the messageAuthenticationAuditLevel setting to Success.
B . Set the messageAuthenticationAuditLevel setting to Success and the auditLogLocation setting to Application.
C . Set the serviceAuthorizationAuditLevel setting to SuccessAndFailure and the messageAuthenticationAuditLevel setting to SuccessAndFailure.
D . Set the messageAuthenticationAuditLevel setting to SuccessAndFailure and the auditLogLocation setting to Security.
-
You are configuring a Windows Server 2008 R2 Hyper-V server. You need to audit changes to Hyper-V roles and authorization rights. Which file should you audit?()
A . AzMan.msc
B . Initial Store.xml
C . machine.config
D . Web.config
-
You execute the following command to audit the database activities: SQL> AUDIT DROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL; What is the effect of this command?()
A . One audit record is created for the whole session if user SCOTT successfully drops one or more tables in his session.
B . One audit record is created for every session when any user successfully drops a table owned by SCOTT.
C . One audit record is created for each successful DROP TABLE command executed by any user to drop tables owned by SCOTT.
D . One audit record is generated for the session when SCOTT grants the DROP ANY TABLE privilege to other users in his session.
E . One audit record is created for each successful DROP TABLE command executed in the session of SCOTT.
-
A developer is designing a multi-tier web application and discovers a need to log each incoming clientrequest. Which two patterns, taken independently, provide a solution for this problem?()
A . Transfer Object
B . Service Locator
C . Front Controller
D . Intercepting Filter
E . Business Delegate
-
While maneuvering, you discover heavy smoke coming from the turbocharger casing, you should ()
A . check the air filter for dirt
B . check for an exhaust leak
C . check the cooling water temperature
D . notify the bridge that you are going to shut the engine dow
-
审计日志(Audit Logs)主要跟踪具有安全意义的TippingPoint用户的相关操作和活动,可能包括()。
A . 更改用户信息
B . 更改配置
C . 访问受控制区域
D . 更改过滤器设置
E . 对系统软件和过滤器的升级操作
-
Consider the Mysql Enterprise Audit plugin. The following event detail is found in the audit log:
https://assets.asklib.com/images/image2/2018080116153463615.jpg
Which two points can be concluded from the given event?()
A . A connection as the user kate was successful
B . A connection failed due to authentication being unsuccessful
C . A connection was attempted via socket rather than TCP
D . A connection was blocked by a firewall or a similar security mechanism
E . A connection failed because the proxy user privileges did not match the login user
-
You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.
What should you do?()
https://assets.asklib.com/images/image2/2018073116571172416.jpg
A . A
B . B
C . C
D . D
-
You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()
A . Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO
B . Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
C . Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
D . Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO
-
You execute the following command to audit database activities: SQL> AUDIT DROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL; What is the effect of this command()
A . One audit record is created for every successful DROP TABLE command executed in the session of SCOTT.
B . One audit record is generated for the session when SCOTT grants the DROP ANY TABLE privilege to otherusers.
C . One audit record is created for the whole session if user SCOTT successfully drops one or more tables inhis session.
D . One audit record is created for every session of any other user in which a table owned by SCOTT isdropped successfully.
E . One audit record is created for every successful DROP TABLE command executed by any user to drop Tables owned by SCOTT
-
You are conducting a cdp-based discovery using an edge switch for the seed. there is a router between the switch and the wlse. none of the access points are discovered, and the discovery log shows the switch is snmp unreachable. What is the problem?()
A . the snmp communities on the switch do not match the wlse.
B . the snmp communities on the access points do not match the wlse.
C . the snmp communities on the access points do not match the switch.
D . the snmp communities on the router do not match the wlse.
-
You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged. What should you do?()
A . Start the Problem Steps Recorder.
B . From Event Viewer, modify the properties of the Security log.
C . From the local Group Policy, configure the Audit object access setting.
D . From the local Group Policy, configure the Audit directory service Access setting.
-
he DBA is about to enable auditing on the Oracle database in an attempt to discover some suspicious activity. Audit trail information is stored in which of the following database object names?()
A . SYS.SOURCE$
B . SYS.AUD$
C . DBA_SOURCE
D . DBA_AUDIT_TRAIL
-
You execute the following command to audit the database activities: SQL> AUDIT DROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL; What is the effect of this command?()
A . One audit record is created for the whole session if user SCOTT successfully drops one or more tables in his session.
B . One audit record is created for every session when any user successfully drops a table owned by SCOTT.
C . One audit record is created for each successful DROP TABLE command executed by any user to drop tables owned by SCOTT.
D . One audit record is generated for the session when SCOTT grants the DROP ANY TABLE privilege to other users in his session.
E . One audit record is created for each successful DROP TABLE command executed in the session of SCOTT.
-
As soon as you discover that you have lost an online redo log, if the database is still functioning, what should be your first action?()
A . Shut down the database
B . Clear the online redo log
C . Back up the database
D . Checkpoint the database
E . Call Oracle support
-
ENT Department is not far. You won’t _____ it.
-
If you _____ the quality, value, or effect of something, you discover or judge how great it is. ( )
observe
survey
measure
investigate
-
令tail -f /var/log/audit/audit.log的作用是
-
You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.If Page.User.Identity.Name "CONTOSO\Administrator" Then Response.Redirect("login.aspx")End IfYou are logged on as Administrator. When you display the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()
A. In the Web.config file, enable impersonation.
B. In IIS, enable anonymous access.
C. In IIS, disable anonymous access.
D. In the Web.config file, set the authentication mode to Windows.
-
Your network contains a single Active Directory domain. All servers on the network are members of thedomain.You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 has two NTFS partitions.You create and share a folder named Data in the root of a partition on Server1.You log on to your computer by using the domain Administrator account and discover that you cannot modify files in the Data share.You need to ensure that the Administrator can modify files in the Data share. The solution must use the minimum amount of permissions.What should you do? ()
A. Modify the NTFS permissions on the Data folder.
B. Modify the share permissions on the Data share.
C. Add the domain administrator to the local Administrator’s group on Server1.
D. Move the Data folder to a new file allocation table (FAT) partition. Share the folder by using the default permissions.
-
You are the administrator of an Active Directory domain named A user reports that he forgot his password and cannot log on to the domain. You discover that yesterday morning the user reset his password and successfully logged on to the domain.You need to enable the user to log on to the domain.What should you do? ()(Choose two)
A. Use Active Directory Users and Computers to move the account to the default organizational unit (OU) named Users. Instruct the user to restart his computer.
B. Use Active Directory Users and Computers to open the account properties for the user‘s user account. Clear the Account is locked out check box, and select the User must change password at next logon check box.
C. Use Active Directory Users and Computers to reset the user‘s password. Give the user the new password.
D. Use Computer Management to reset the password for the local Administrator account.
-
Your network consists of a single Active Directory domain. The domain contains a server namedServer1 that runs Windows Server 2003 Service Pack 2 (SP2).Your company’s security policy states that domain users must be prevented from logging on to Server1 ifa domain controller is unavailable.You disconnect Server1 from the network and discover that you can log on to Server1.You need to configure Server1 to comply with the company’s security policy.What should you do on Server1?()
A. From the local security policy, modify the Security Options.
B. From the local security policy, modify the User Rights Assignment.
C. From Active Directory Users and Computers, modify the properties of the Server1 account.
D. From Active Directory Users and Computers, modify the properties of the Domain Computers group.