题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-11-04 04:48:23

[多项选择] Consider the MySQL Enterprise Audit plugin, You add the following lines to the my.cnf configuration tile: [mysqld] Plugin-load=audit_log.so Audit-log=FORCE_PLUS_PERMANENT You attempt to start up the MySQL service and notice that it fails to start. Which two statements would explain why the service did not start?()
A. FORCE_PLUS_PERMANENT is not valid for the audit-log option
B. The audit_log.so library does not exist
C. The audit_log.so library is in a location that is different from that defined by the plugin_dir option
D. The audit plugin must be loaded dynamically by using the INSTALL PLUGIN command
E. The audit log file does not exist in which to write audit events
F. The audit_log.so library is not an executable file

更多"Consider the MySQL Enterprise Audit"的相关试题:

[单项选择]Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()
A. The attribute "STATUS" is set to the string EXTERNAL_AUTH
B. The attribute "PRIV_USER" contains the username
C. The event type that is given in the attribute "NAME" is EXTERNAL_AUTH
D. There is no differentiation between native and external authentication events
E. External authentication is managed through external auditing logs
F. The "PROXY_PRIV" user shows a username if external authentication is used
[单项选择] Consider the Mysql Enterprise Audit plugin. A CSV file called data.csv has 100 rows of data. The stored procedure prepare_db ( ) has 10 auditable statements. You run the following statements in the mydb database: Mysql> CALL prepare_db ( ); Mysql> LOAD DATA INFILE '/tmp/data.cav' INTO TABLE mytable; Mysql> SHOW TABLES; How many events are added to the audit log as a result of the preceding statements?()
A. 12; only top-level statements and stored procedure events are logged
B. 111; top-level statements and all lower-level statements are logged
C. 3; only the top-level statements are logged
D. 102; top-level statements are logged, but LOAD DATA INFILE is logged as a separate event
[单项选择] You execute the following commands to audit database activities: SQL > ALTER SYSTEM SET AUDIT_TRIAL=DB, EXTENDED SCOPE=SPFILE; SQL > AUDIT SELECT TABLE, INSERT TABLE, DELETE TABLE BY JOHN By SESSION WHENEVER SUCCESSFUL; Which statement is true about the audit record that generated when auditing after instance restarts?()
A. One audit record is created for every successful execution of a SELECT, INSERT OR DELETE command on a table, and contains the SQL text for the SQL Statements.
B. One audit record is created for every successful execution of a SELECT, INSERT OR DELETE command, and contains the execution plan for the SQL statements.
C. One audit record is created for the whole session if john successfully executes a SELECT, INSERT, or DELETE command, and contains the execution plan for the SQL statements.
D. One audit record is created for the whole session if JOHN successfully executes a select command, and contains the SQL text and bind variables used.
E. One audit record is created for the whole session if john successfully executes a SELECT, INSERT,or DELETE command on a table, and contains the execution plan, SQL text, and bind variables used.
[单项选择] You are the network administrator for  You administare a Windows Server 2003 computer named TestKing12. TestKing12 has a single disk. The disk is configured so that it has four primary partitions, which are formatted as FAT32. The disk also has unallocated space available. You need to use the unallocated disk space to store user data. What should you use?()
A. Convert all existing partitions to NTFS.
B. Using Diskpart.exe, run the create command.
C. Convert the disk to a dynamic disk, and create a new volume.
D. Using Diskpart.exe, run the extend command.
[单项选择]You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1.You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses.You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()
A. Create a new display filter and apply the filter to the capture.
B. Create a new capture filter and apply the filter to the capture.
C. Populate the Aliases table and apply the aliases to the capture.
D. Configure the Network Monitor application to enable the Enable Conversations option. Recapture the data to a new file.
[单项选择]You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server.You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB.You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data.What should you do?()
A. Apply the display filter !DNS and save the displayed frames as a DNSdata.cap file.
B. Apply the capture filter DNS and save the displayed frames as a DNSdata.cap file.
C. Add a new alias named DNS to the aliases table and save the file as DNSdata.cap.
D. Run the nmcap.exe /inputcapture data.cap /capture DNS /file DNSdata.cap command.
[单项选择] You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()
A. All users except SYS
B. All users except SCOTT
C. All users except sys and SCOTT
D. All users except sys, system, and SCOTT
[单项选择]You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:/data.cap file.You create a scheduled task. You add a new Start a program action to the task.You need to add the application name and the application arguments to the new action.What should you do?()
A. Add nmcap.exe as the application name. Add the /networks * /capture LDAP /file e:/data.cap / stopwhen / timeafter 11hours line as arguments.
B. Add netmon.exe as the application name. Add the /networks */capture LDAP /file e:/data.cap / stopwhen / timeafter 11hours line as arguments.
C. Add nmcap.exe as the application name. Add the /networks * /capture !LDAP /file e:/data.cap / stopwhen / timeafter 11hours line as arguments.
D. Add nmconfig.exe as the application name. Add the /networks * /capture &LDAP /file e:/data.cap / stopwhen / timeafter 11hours line as arguments.
[单项选择]You are maintaining the SALES database.You have added a new disk to a disk group. Automatic Storage Management performs the rebalancing activity. You want to speed up the rebalancing activity.Which parameter should you specify to control the speed of the rebalancing activity?()
A. ASM_POWER_LIMIT
B. ASM_DISKSTRING
C. ASM_DISKGROUPS
D. INSTANCE_TYPE
[单项选择]Which MySQL utility program should you to process and sort the slow Query log based on query time or average query time?()
A. Mysqlaccess
B. Mysqldump
C. Mysqlshow
D. Mysqlslow
E. Mysqldumpslow
[单项选择] You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.  What should you do?()
A. Enable the Problem Reporting feature for all users.
B. Configure a custom view to monitor failed logon events on your computer.
C. Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.
D. In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.
[多项选择] You enabled an audit policy by issuing the following statements: SQL> AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT; SQL> AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM; For which database users and for which executions is the audit policy now active? ()
A. SYS, SYSTEM
B. SCOTT
C. Only for successful executions
D. Only for failed executions
E. Both successful and failed executions
[单项选择] While reviewing the MySQL error log, you see occasions where MySQL has exceeded the number of file handles allowed to it by the operating system. Which method will reduce the number of file handles in use?()
A. Activating the MySQL Enterprise thread pool plugin
B. Relocating your data and log files to separate storage devices
C. Disconnecting idle localhost client sessions
D. Implementing storage engine data compression options
[单项选择] You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24hours. You save the capture file as data.cap. you find that the size of this file is more tahn 1GB. you need to create a file named DNSdata.cap from the existing capture file taht contains only dNS -related data  What should you do()? 
A. apply the display filter !DNS and save the displayed frames as DNSdata.cap file
B. Apply the capture filter DNS and save the displayed frames as a DNSdata.cap file
C. Add a new alisa named DNS to the aliases table and save the file as DNSdata.cap
D. Run the nmcap.exe /inputcapture data.cap /capture DNS /file DNSdata.cap command.
[单项选择]You perform a security audit on a server named server1. You install the Microsoft network monitor 3.0 application on server1. You find that only some of the captured frames dsplay host mnemonic names in the source column and the destination column. All other frames display ip addresses. You need to display mnemonic host names instead of ip addresses for all the frames what should you do?()
A. Create a new display filter and apply the filter to the capture.
B. Create a new capture filter and apply the filter to the capture.
C. Populate the aliases table and apply the aliases to the capture.
D. Configure the network monitor application to enable the enable converstations option, recapture the data to a new file.

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

截图扫码使用小程序[完全免费查看答案]
请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码