单选题A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()A the user can see all other users, including those in the Admin group, but can modify only the u

题目
单选题
A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()
A

the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor group

B

the user can see all the users except those in the Admin group, but can only modify the user’s own account

C

the user can see only the user’s own account, and cannot modify it

D

the user can see only the user’s own account, and can change the password only

参考答案和解析
正确答案: D
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" >"Sensors" >"Sensor Event Policies" >[rule name] to accomplish this?()

A. Ignore

B. Replace users role

C. Terminate user session

D. Disable user account


参考答案:B

第2题:

A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()

  • A、the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor group
  • B、the user can see all the users except those in the Admin group, but can only modify the user’s own account
  • C、the user can see only the user’s own account, and cannot modify it
  • D、the user can see only the user’s own account, and can change the password only

正确答案:D

第3题:

You are the administrator of a Windows Server 2003 computer named Server4.You install Terminal Services on Server4. You add users from the technical support department to the Power Users group and to the Remote Desktop Users group on Server4. You notice that Server4 is periodically unavailable. You open Event Viewer on Server4 and discover that theserver was restarted accidentally by users in the technical support department.You need to ensure that users in the technical support department can establish a Terminal Service session and can manage local user accounts on Server4 without having the ability to restart Server 4.Which action or actions should you perform?() (Choose all that apply.)

A. Remove the technical support user accounts from the Power Users group.

B. Remove the technical support user accounts from the Remote Desktop Users group.

C. Remove the Power Users group from the Shut down the system user right.

D. Add the Power Users group to the Deny log on locally user right.

E. Modify the permissions on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission.


参考答案:C

第4题:

View the Exhibit to observe the roles assigned to the SL_REP user.  Which statement is true about theassignment of the SELECT_CATALOG_ROLE role to the SL_REP user()

  • A、The user must enable the role explicitly.
  • B、The user can grant the role to other users.
  • C、The user cannot use the role until the DBA enables it explicitly.
  • D、The user can start using the role immediately without any changes

正确答案:A

第5题:

You have a hosted Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack l (SP1) installed.The organization contains a distribution group named Group1.You need to ensure that a user named User1 can review and approve all messages sent to Group1. What should you do?()

  • A、Modify the Managed By list for Group1.
  • B、Create a new journal rule and specify User1 as the journal recipient.
  • C、Modify the mail flow settings for User1.
  • D、Modify the mail flow settings for Group1.

正确答案:D

第6题:

Which of the following is true about the following share access properties? ()

  • A、 +managers will be resolved as a Winbind group.  
  • B、 The timo and taki users can manipulate files regardless of the file system permissions.  
  • C、 +managers will be resolved as a Unix group.  
  • D、 +managers is a builtin default Samba group.  
  • E、 The "admin users" can be applied only to print shares.

正确答案:B,C

第7题:

Which two statements are true when using the configure exclusive CLI command?()

  • A、Multiple users can enter configuration mode and have their own private configuration.
  • B、When a user commits, only the user's changes are committed.
  • C、A message indicates which other users are in configuration mode and what portion of the configuration they are editing.
  • D、Only a single user can edit the configuration.

正确答案:B,D

第8题:

Which three statements are true about the working of system privileges in a multitenant control database(CDB) that has pluggable databases (PDBs)?()

A. System privileges apply only to the PDB in which they are used.

B. Local users cannot use local system privileges on the schema of a common user.

C. The granter of system privileges must possess the set container privilege.

D. Common users connected to a PDB can exercise privileges across other PDBs.

E. System privileges with the with grant option container all clause must be granted to a common user before the common user can grant privileges to other users.


参考答案:A, C, E

第9题:

Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()

  • A、Ignore
  • B、Replace users role
  • C、Terminate user session
  • D、Disable user account

正确答案:B

第10题:

Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()

  • A、It can be used to allow the access privilege settings for users but not roles.
  • B、It can be used to allow the access privilege settings for users as well as roles.
  • C、It can be used to control the time interval for which the access privilege is available to a user.
  • D、It can be used to selectively restrict the access for each user in a database to different host computers.
  • E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

正确答案:B,C,D

更多相关问题