QUESTION 1 What is a description of Governance? A. How IT resources will be used to meet goals and deliver business value B. a process that ensures individualsare aware of regulations, policies, and procedures that must be followed as a result of senior management decisions management C. Who holds the authority to make decisions, determines […]
QUESTION 1 Data is being replicated from site A to site B using disk buffering to create extended distance consistent point in time copies every hour. In the event of a site failure at A, what is the maximum amount of data that will be missing at site B? A. 1 hour B. 2 hours […]
QUESTION 1 Which two statements are true about the use of direct path loads when selecting from external tables in a database on a Database Machine? A. INSERT INTO . . . SELECT FROM statements, executed serially, which select from external tables, require the APPEND hint to use direct path loading. B. CREATE TABLE . […]
QUESTION 1 What items need to be evaluated when choosing a scanner? A. Documents, images, and storage medium B. Resolution, compression, and memory C. Workflow, ease of use, and productivity D. Interface, resolution, and paper handling Answer: D QUESTION 2 When designing the input environment for the proposed Document Management System (DMS), which of the […]
QUESTION 1 An architectural review is BEST for finding which of the following security defects? A. Malware infection vectors B. SQL or other injection flaws C. Design flaws D. Zero-day vulnerabilities Answer: C QUESTION 2 Which of the following describes a security risk that may have to be accepted when using a commercial cross-platform mobile […]
QUESTION 1 A technician installs an additional hard drive controller. Which of the following processes will MOST likely prevent errors? A. 1) Apply System Updates 2) Update the BIOS 3) Install the card 4) Install the driver 5) Upgrade the Card Firmware B. 1) Install the card 2) Update the BIOS 3) Upgrade the Card […]
QUESTION 1 Which of the following is the access level of a user that belongs to both the Administrators and Users groups? A. User B. Administrator C. Power User D. Remote Desktop User Answer: B QUESTION 2 Which of the following contains the user profile directory for Microsoft Windows 2000 and XP? A. Users B. […]
QUESTION 1 Which two steps should an administrator take to remove an Access Gateway appliance from an Access Gateway 4.5 Advanced Edition deployment? (Choose two.) A. The administrator should execute the “Remove Access Gateway” task from the “Gateway Appliances” node in the Access Management Console. B. The administrator should restart at least one Advanced Access […]
QUESTION 1 Scenario: An administrator is implementing a two-factor authentication solution with an RSA SecureID product. The administrator already has the server name and port number of the RSA server. Which additional information does the administrator need to configure RSA SecureID? A. LDAP password B. Firewall access rule C. Authentication policy D. RADIUS shared secret […]
QUESTION 1 Scenario: An administrator is implementing a two-factor authentication solution with an RSA SecureID product. The administrator already has the server name and port number of the RSA server. Which additional information does the administrator need to configure RSA SecureID? A. LDAP password B. Firewall access rule C. Authentication policy D. RADIUS shared secret […]
QUESTION 1 View the Exhibit and examine the structure of the EMP table. Which stages are performed when the above block is executed? (Choose all that apply) A. Bind B. Parse C. Fetch D. Execute Answer: BCD QUESTION 2 Which system events can be used to create triggers that fire both at database and […]
QUESTION 1 View the Exhibit and examine the structure of the ORDERS table. You have to display ORDER_ID, ORDER_DATE, and CUSTOMER_ID for all those orders that were placed after the last order placed by the customer whose CUSTOMER_ID is 101. Which query would give you the desired output? A. SELECT order_id, order_date FROM orders […]
QUESTION 1 You have assigned rights profiles directly to the uses frank and now you want to add another profile. Which command enables you to list profiles directly assigned to frank? A. userattr profiles frank B. profiles – p frank C. useratter -p frank D. profiles frank Answer: B Explanation: http://docs.oracle.com/cd/E26502_01/html/E36219/rights-1.html (see the example 9-1)
QUESTION 1 What determines which bits in an IP address represent the subnet, and which represent the host? A. Subnet B. unicast C. netmask D. multicast E. broadcast Answer: C QUESTION 2 Which two accurately identify features of a Solaris 10 branded zone? A. executes in a Solaris 10 global zone B. is created by […]
QUESTION 1 You need to generate a report on all of the Exchange Server 2007 computers in your Exchange organization. The report must include: – Operating system versionNumber of processors – Total physical memory – Number of storage groups – Number of mailbox databases What should you do? A. Run the Get-ExchangeServer | Format-List cmdlet. […]