The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups
第1题:
A. The transparent encryption of backups uses the encryption wallet
B. The database uses the same encryption key for every encrypted backup
C. The password encryption of backups only uses the password while creating and restoring backup
D. If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第2题:
第3题:
A. Provide a password for the encryption
B. Set up an Oracle wallet for the encryption
C. No setup is required as it is a default encryption method
D. Both Oracle wallet and password must be set up for the encryption
第4题:
Which description about asymmetric encryption algorithms is correct?()
第5题:
Which statement about OSPF authentication is true?()
第6题:
Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital ( ) to be placed on messages. A digital signature uses the sender&39;s private key to encrypt some portion of the message. When the message is received, the receiver uses the sender&39;s ( ) key tp decipher the digital signature to verify the sender&39;s identity.
A.host B.terminal C.sending D.receiving A.plain B.cipher C.public D.private A.plain B.cipher C.public D.private A.interpretation B.signatures C.encryption D.decryption A.plain B.cipher C.public D.private
第7题:
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()
第8题:
A. The transparent encryption of backups uses the encryption wallet
B. The database uses the same encryption key for every encrypted backup
C. The password encryption of backups only uses the password while creating and restoring backup
D. If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第9题:
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. The company stores clients data in DB1. Clients can access their profile data by using a Web application. You must ensure the security of the customer data, you must ensure that even if the backup media is lost, data files, log files and subsequent backups and so on are quite safe. So what action should you perform to achieve this goal?()
第10题:
Which two wireless security statements are true?()