Which statement is true regarding this setting?()A、It drops the connection after the specified number of login attempts fail for any user.B、It is enforced only if the password profile is enabled for the user. C、It locks the user account after the specifie

题目

Which statement is true regarding this setting?()

  • A、It drops the connection after the specified number of login attempts fail for any user.
  • B、It is enforced only if the password profile is enabled for the user. 
  • C、It locks the user account after the specified number of attempts. 
  • D、It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following security features are enabled by default after creating an instance?()

  • A、Password Invalidation
  • B、Login Timeout
  • C、Cross Site Scripting Protection
  • D、Access Logging

正确答案:A

第2题:

Which statement describes the Authentication Proxy feature?()

  • A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
  • B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
  • C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
  • D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.

正确答案:B

第3题:

You are administering a database and you receive a requirement to apply the following restrictions:1. A connection must be terminated after four unsuccessful login attempts by user.2. A user should not be able to create more than four simultaneous sessions.3. User session must be terminated after 15 minutes of inactivity.4. Users must be prompted to change their passwords every 15 days.How would you accomplish these requirements?()

A. by granting a secure application role to the users

B. by creating and assigning a profile to the users and setting the REMOTE_OS_AUTHENT parameter to false

C. By creating and assigning a profile to the users and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameter to 4

D. By Implementing Fine-Grained Auditing (FGA) and setting the REMOTE_LOGIN_PASSWORD_FILE parameter to none.

E. By implementing the database resource Manager plan and setting the SEC_MAX_FAILED_LOGIN_ATTEMPTS parameters to 4.


参考答案:A

第4题:

Examine the command: SQL> ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()

  • A、The SKD user cannot log in to the database instance.
  • B、The objects owned by the SKD user are not accessible to any user.
  • C、The other users can access the objects owned by the SKD user, on which they have access.
  • D、The password for the SKD user expires and the user is forced to change the password at the next log in.

正确答案:A,C

第5题:

Examine the command: SQL> ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()

  • A、The SKD user cannot log in to the database instance.
  • B、The objects owned by the SKD user are not accessible to any user.
  • C、The other users can access the objects owned by the SKD user, on which they have access.
  • D、The password for the SKD user expires and the user is forced to change the password at the next log in

正确答案:A,C

第6题:

To make audit information more productive, the DBA executes the following command before startingan audit operation:  SQL> ALTER SYSTEM SET AUDIT_TRAIL=DB,EXTENDED SCOPE=SPFILE;  Which statement is true regarding the audit record generated when auditing starts after restarting thedatabase()

  • A、It contains only the plan for the SQL statement executed by the user.
  • B、It contains the SQL text executed by the user and the bind variables used with it.
  • C、It contains the plan and statistics associated with the SQL statement executed by the user.
  • D、It contains the plan for the SQL statement executed by the user and the bind variables used with it.

正确答案:B

第7题:

An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()

  • A、A shell other than ksh is being used by the user.
  • B、The line ’export ENV=$HOME/.env’ is missing from /etc/profile.
  • C、The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.
  • D、The env_profile attribute is not defined for the user within /etc/security/user.

正确答案:C

第8题:

Which of the following is NOT a security feature relating to user accounts?()

  • A、Some commands can be password protected requiring logged in customers to re-enter their password.
  • B、A user account can be disabled automatically, after a specified number of invalid login attempts.
  • C、An account can have multiple valid passwords at the same time, any of which can be used to access the account.
  • D、The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.
  • E、Logged in customers can be logged off of the system after a specified period of inactivity.

正确答案:C

第9题:

Your database initialization parameter file has the following entry:   SEC_MAX_FAILED_LOGIN_ATTEMPTS=3   Which statement is true regarding this setting?()

  • A、 It drops the connection after the specified number of login attempts fail for any user.
  • B、 It is enforced only if the password profile is enabled for the user.
  • C、 It locks the user account after the specified number of attempts.
  • D、 It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.

正确答案:A

第10题:

You have a durable subscriber, and the subscriber is down or not reachable when the message is  produced. Which two options regarding the expiry of these messages are true?()

  • A、after the subscriber is unavailable for 10 minutes
  • B、when the subscriber is available
  • C、after the subscriber is unavailable for after an hour
  • D、are available until the specified time elapses
  • E、are expired instantly

正确答案:B,D

更多相关问题