Question 1
What information does the Task History feature provide?
Choose more than one option.
All messages issued from the Task Center
Details of tasks that have executed<= Correct Answer
Execution statistics for tasks that have executed<= Correct Answer
Task results <= Correct Answer
Question 2
What steps do you need to perform to convert a script into a task?
Choose more than one option.
Create an equivalent QUIESCE command
Define success and failure conditions<= Correct Answer
Schedule the date and time that the script will run<= Correct Answer
Specify notifications to be sent <= Correct Answer
Question 3
What do the following values in the entry header for a notification log entry specify generated the entry?
PID:3468(db2syscs.exe)
TID:3368 Appid:*LOCAL.DB2.00D305132415
Choose more than one option.
The process with ID 3468<= Correct Answer
The process with ID LOCAL.DB2.00D305132415
The transaction with ID 3368<= Correct Answer
The transaction with ID 3468
Question 4
What actions can you perform once a task completes?
Choose more than one option.
Create a FORCE APPLICATION command
Delete the completed task<= Correct Answer
Disable another task<= Correct Answer
Run another task <= Correct Answer
Question 5
Which tools enable you to view notification log information on a DB2 server running Windows 2003?
Choose more than one option.
Task Center
The Database History view of the Journal
The Notification Log view of the Journal<= Correct Answer
Windows Event Viewer <= Correct Answer
星期六, 11月 13, 2010
星期五, 11月 12, 2010
Manage DB2 database connections
Q1,
Which command do you use to list all applications currently connected to the STOCKDB2 instance?
Choose an option.
LIST APPLICATIONS FOR DATABASE STOCK
LIST APPLICATIONS FOR DATABASE STOCKDB2< It is a correct answer >
LIST APPLICATIONS FOR STOCKDB2
LIST DATABASE STOCKDB2
Q2,
What does the command QUIESCE INSTANCE MY_INST FOR USER SYSMAINT IMMEDIATE FORCE CONNECTIONS do?
Choose more than one option.
Enable only the user with SYSMAINT authority to access the MY_INST instance< It is a correct answer >
Force all connections to the MY_INST instance to terminate
Place the MY_INST instance in quiesce mode immediately< It is a correct answer >
Specify that the MY_INST instance cannot be taken out of quiesce mode
Q3,
What happens to running transactions that you haven't yet committed when you place a database in quiesce mode?
Choose an option.
They are committed
They are placed in quiesce mode
They are rolled back< It is a correct answer >
Q4,
Which of the following SQL commands forces the application with a handle of 5 to terminate its connection to the SALES database?
Choose an option.
FORCE (5)
FORCE ALL
FORCE APPLICATION (5)< It is a correct answer >
LIST APPLICATIONS FOR DATABASE SALES
Q5,
Suppose you run the FORCE APPLICATION command to kill all active database connections. What will continue to run?
Choose more than one option.
Applications currently creating or updating a database< It is a correct answer >
Idle applications
The DB2 Database Manager < It is a correct answer >
Which command do you use to list all applications currently connected to the STOCKDB2 instance?
Choose an option.
LIST APPLICATIONS FOR DATABASE STOCK
LIST APPLICATIONS FOR DATABASE STOCKDB2< It is a correct answer >
LIST APPLICATIONS FOR STOCKDB2
LIST DATABASE STOCKDB2
Q2,
What does the command QUIESCE INSTANCE MY_INST FOR USER SYSMAINT IMMEDIATE FORCE CONNECTIONS do?
Choose more than one option.
Enable only the user with SYSMAINT authority to access the MY_INST instance< It is a correct answer >
Force all connections to the MY_INST instance to terminate
Place the MY_INST instance in quiesce mode immediately< It is a correct answer >
Specify that the MY_INST instance cannot be taken out of quiesce mode
Q3,
What happens to running transactions that you haven't yet committed when you place a database in quiesce mode?
Choose an option.
They are committed
They are placed in quiesce mode
They are rolled back< It is a correct answer >
Q4,
Which of the following SQL commands forces the application with a handle of 5 to terminate its connection to the SALES database?
Choose an option.
FORCE (5)
FORCE ALL
FORCE APPLICATION (5)< It is a correct answer >
LIST APPLICATIONS FOR DATABASE SALES
Q5,
Suppose you run the FORCE APPLICATION command to kill all active database connections. What will continue to run?
Choose more than one option.
Applications currently creating or updating a database< It is a correct answer >
Idle applications
The DB2 Database Manager < It is a correct answer >
星期四, 11月 11, 2010
Security in a DB2 UDB
Q1,
If the client authentication type is KERBEROS and the server authentication type is KRB_SERVER_ENCRYPT, what authentication type does the system use?
Choose an option.
CLIENT
KERBEROS < Correct >
KRB_SERVER_ENCRYPT
SERVER
SERVER_ENCRYPT
Q2,
Which privileges are object privileges?
Choose more than one option.
BIND < Correct >
BINDADD
CONNECT
PASSTHRU < Correct >
REFERENCES < Correct >
Q3,
Suppose an administrator specified the WITH GRANT OPTION option when granting a user the SELECT table object privilege. What does this enable the user to do?
Choose an option.
Grant and revoke all table object privileges except for the CONTROL privilege
Grant the SELECT privilege but not revoke any privileges < Correct >
Revoke all privileges and grant the LOAD authority
Revoke the SELECT privilege and grant any privileges specified with the WITH GRANT OPTION option
Q4,
Suppose a user needs to be able to quiesce a database, adjust parameter values in the DB2 Database Manager configuration file for an instance, and configure authority levels for other users. What is the lowest authority you can assign to the user to provide the required privileges?
Choose an option.
Database Administration authority (DBADM)
Load authority (LOAD)
System Administration authority (SYSADM) < Correct >
System Control authority (SYSCTRL)
System Maintenance authority (SYSMAINT)
If the client authentication type is KERBEROS and the server authentication type is KRB_SERVER_ENCRYPT, what authentication type does the system use?
Choose an option.
CLIENT
KERBEROS < Correct >
KRB_SERVER_ENCRYPT
SERVER
SERVER_ENCRYPT
Q2,
Which privileges are object privileges?
Choose more than one option.
BIND < Correct >
BINDADD
CONNECT
PASSTHRU < Correct >
REFERENCES < Correct >
Q3,
Suppose an administrator specified the WITH GRANT OPTION option when granting a user the SELECT table object privilege. What does this enable the user to do?
Choose an option.
Grant and revoke all table object privileges except for the CONTROL privilege
Grant the SELECT privilege but not revoke any privileges < Correct >
Revoke all privileges and grant the LOAD authority
Revoke the SELECT privilege and grant any privileges specified with the WITH GRANT OPTION option
Q4,
Suppose a user needs to be able to quiesce a database, adjust parameter values in the DB2 Database Manager configuration file for an instance, and configure authority levels for other users. What is the lowest authority you can assign to the user to provide the required privileges?
Choose an option.
Database Administration authority (DBADM)
Load authority (LOAD)
System Administration authority (SYSADM) < Correct >
System Control authority (SYSCTRL)
System Maintenance authority (SYSMAINT)
星期三, 11月 10, 2010
The DB2 client/server environment
What do configuration parameters control about the DB2 Discovery facility?
Choose more than one option.
Whether a client can initiate DB2 Discovery requests This was a correct option
Whether a server responds to known discovery requests only This was a correct option
Whether a server returns information about an instance in response to a discovery request This was a correct option
Whether a specific client is authorized to access a database This was not a correct option
Identify the situations in which you need to manually configure DB2 communication settings.
Choose more than one option.
When connecting a new client to a server This was not a correct option
When installing the Advanced Program-to-Program Communications (APPC) protocol This was a correct option
When reconfiguring the NetBIOS protocol This was a correct option
When starting DB2 for the first time This was not a correct option
Suppose a server hosts one instance - InterDB - with two databases - Marketing and Finance. You set the DISCOVER_DB parameter to DISABLE for Finance and to ENABLE for Marketing. In the DB2 Database Manager configuration file for InterDB, you set the DISCOVER_INST parameter to DISABLE. Identify the result of these settings.
Choose an option.
Both databases are hidden This was the correct option
InterDB returns information about the databases This was not the correct option
Only Finance and InterDB are hidden This was not the correct option
YThe server ignores discovery requests This was not the correct option
How can you configure DB2 communication settings manually?
Choose more than one option.
Configure the DB2 Discovery facility This was not a correct option
Edit the DB2 Database Manager configuration file This was a correct option
Run a SQL statement This was not a correct option
Set options in the Control Center This was a correct option
Choose more than one option.
Whether a client can initiate DB2 Discovery requests This was a correct option
Whether a server responds to known discovery requests only This was a correct option
Whether a server returns information about an instance in response to a discovery request This was a correct option
Whether a specific client is authorized to access a database This was not a correct option
Identify the situations in which you need to manually configure DB2 communication settings.
Choose more than one option.
When connecting a new client to a server This was not a correct option
When installing the Advanced Program-to-Program Communications (APPC) protocol This was a correct option
When reconfiguring the NetBIOS protocol This was a correct option
When starting DB2 for the first time This was not a correct option
Suppose a server hosts one instance - InterDB - with two databases - Marketing and Finance. You set the DISCOVER_DB parameter to DISABLE for Finance and to ENABLE for Marketing. In the DB2 Database Manager configuration file for InterDB, you set the DISCOVER_INST parameter to DISABLE. Identify the result of these settings.
Choose an option.
Both databases are hidden This was the correct option
InterDB returns information about the databases This was not the correct option
Only Finance and InterDB are hidden This was not the correct option
YThe server ignores discovery requests This was not the correct option
How can you configure DB2 communication settings manually?
Choose more than one option.
Configure the DB2 Discovery facility This was not a correct option
Edit the DB2 Database Manager configuration file This was a correct option
Run a SQL statement This was not a correct option
Set options in the Control Center This was a correct option
星期二, 11月 09, 2010
The DB2 system environment
Which profile registry stores environment variable settings for a workstation?
Choose an option.
DB2 Global Level Profile Registry This was the correct option
DB2 Instance Level Profile Registry This was not the correct option
DB2 Instance Node Level Profile Registry This was not the correct option
Suppose you want to check the contents of the DBM configuration file, enable the AUTORESTART parameter of the CLIENTS database, and then display the instances available on a system. Which commands do you use to do configure the DB2 environment in this way?
Choose more than one option.
DASLIST This was not a correct option
Which command do you use to check which registry variables a system supports?
Choose an option.
DB2SET - ALL This was not the correct option
DB2SET -LR This was the correct option
DB2SET - U This was not the correct option
DB2SET - UR This was not the correct option
Which command resets the profile registry for the DB2 instance?
Choose an option.
DB2SET -G This was not the correct option
DB2SET -H This was not the correct option
DB2SET -I This was not the correct option
DB2SET - R This was the correct option
Suppose you want to disable sequential detection for a database called SALES. The change must take effect instantly. Which command do you run from the Command Center to do this?
Choose an option.
UPDATE DB CFG FOR SALES USING SEQDETECT NO DEFERRED This was not the correct option
UPDATE DB CFG FOR SALES USING SEQDETECT NO IMMEDIATE This was the correct option
UPDATE DBM CFG FOR SALES USING SEQDETECT NO This was not the correct option
UPDATE DBM CFG FOR SALES USING SEQDETECT NO IMMEDIATE This was not the correct option
Choose an option.
DB2 Global Level Profile Registry This was the correct option
DB2 Instance Level Profile Registry This was not the correct option
DB2 Instance Node Level Profile Registry This was not the correct option
Suppose you want to check the contents of the DBM configuration file, enable the AUTORESTART parameter of the CLIENTS database, and then display the instances available on a system. Which commands do you use to do configure the DB2 environment in this way?
Choose more than one option.
DASLIST This was not a correct option
DB2SET -L This was a correct option
GET DBM CFG This was a correct option
UPDATE DB CFG USING CLIENTS AUTORESTART ON This was a correct option
Which command do you use to check which registry variables a system supports?
Choose an option.
DB2SET - ALL This was not the correct option
DB2SET -LR This was the correct option
DB2SET - U This was not the correct option
DB2SET - UR This was not the correct option
Which command resets the profile registry for the DB2 instance?
Choose an option.
DB2SET -G This was not the correct option
DB2SET -H This was not the correct option
DB2SET -I This was not the correct option
DB2SET - R This was the correct option
Suppose you want to disable sequential detection for a database called SALES. The change must take effect instantly. Which command do you run from the Command Center to do this?
Choose an option.
UPDATE DB CFG FOR SALES USING SEQDETECT NO DEFERRED This was not the correct option
UPDATE DB CFG FOR SALES USING SEQDETECT NO IMMEDIATE This was the correct option
UPDATE DBM CFG FOR SALES USING SEQDETECT NO This was not the correct option
UPDATE DBM CFG FOR SALES USING SEQDETECT NO IMMEDIATE This was not the correct option
星期一, 11月 08, 2010
Instance management in DB2
Which command lists the name of the DB2 Administration Server (DAS) tool on a Windows operating system?
Choose an option.
DASLIST This was not the correct option
DASCRT This was not the correct option
DB2ADMIN This was the correct option
GET ADMIN CFG This was not the correct option
Which command enables you to connect to the PAYROLL instance?
Choose an option.
ATTACH TO PAYROLL; This was the correct option
DB2IDROP PAYROLL; This was not the correct option
DB2ILIST PAYROLL; This was not the correct option
DB2START PAYROLL; This was not the correct option
Which command migrates the PAYROLL instance to a newer version of DB2?
Choose an option.
DB2ADMIN PAYROLL This was not the correct option
DB2ICRT PAYROLL This was not the correct option
DB2IMIGR PAYROLL This was the correct option
DB2IUPDT PAYROLL This was not the correct option
Which command creates an instance named "SALES"?
Choose an option.
DB2ICRT SALES This was the correct option
DB2IMGR SALES This was not the correct option
DB2IUPDT SALES This was not the correct option
DB2START SALES This was not the correct option
Which command do you use to display all instances available on a system?
Choose an option.
DB2IDROP This was not the correct option
DB2ILIST This was the correct option
DB2IUPDT This was not the correct option
DB2START This was not the correct option
Choose an option.
DASLIST This was not the correct option
DASCRT This was not the correct option
DB2ADMIN This was the correct option
GET ADMIN CFG This was not the correct option
Which command enables you to connect to the PAYROLL instance?
Choose an option.
ATTACH TO PAYROLL; This was the correct option
DB2IDROP PAYROLL; This was not the correct option
DB2ILIST PAYROLL; This was not the correct option
DB2START PAYROLL; This was not the correct option
Which command migrates the PAYROLL instance to a newer version of DB2?
Choose an option.
DB2ADMIN PAYROLL This was not the correct option
DB2ICRT PAYROLL This was not the correct option
DB2IMIGR PAYROLL This was the correct option
DB2IUPDT PAYROLL This was not the correct option
Which command creates an instance named "SALES"?
Choose an option.
DB2ICRT SALES This was the correct option
DB2IMGR SALES This was not the correct option
DB2IUPDT SALES This was not the correct option
DB2START SALES This was not the correct option
Which command do you use to display all instances available on a system?
Choose an option.
DB2IDROP This was not the correct option
DB2ILIST This was the correct option
DB2IUPDT This was not the correct option
DB2START This was not the correct option
星期五, 11月 05, 2010
Topic:Receiving Mail in Lotus Notes 7
You're running Notes Minder but not Lotus Notes. What can you use Notes Minder to do?
Choose an option.
Keep a count of the new memos
Notify you of newly received memos
Open new memos
Start running Notes
Suppose you want to reply to every recipient of an invitation message. What should you do?
Choose an option.
Forward your response
Reply to the original sender
Reply to all
Send and save the message
Suppose you want to view the contents of a memo and the Inbox at the same time. What should you do?
Choose an option.
Open the All Documents folder
Open the Drafts view
Open the memo
Open the preview pane
Suppose a manager has sent you a memo with an attachment containing a spreadsheet that needs to be updated. You've made some changes and now need to send the spreadsheet back to the manager. What should you do?
Choose an option.
Copy the contents of the document in the memo's body and send
Forward the memo with the document attached
Reply with the spreadsheet attached
Send the memo with the document attached
Choose an option.
Notify you of newly received memos
Start running Notes
Suppose you want to reply to every recipient of an invitation message. What should you do?
Choose an option.
Reply to the original sender
Reply to all
Suppose you want to view the contents of a memo and the Inbox at the same time. What should you do?
Choose an option.
Open the Drafts view
Open the memo
Open the preview pane
Suppose a manager has sent you a memo with an attachment containing a spreadsheet that needs to be updated. You've made some changes and now need to send the spreadsheet back to the manager. What should you do?
Choose an option.
Forward the memo with the document attached
Reply with the spreadsheet attached
星期四, 11月 04, 2010
Composing and Sending Mail in Lotus Notes 7
When you create an e-mail, what field or option will indicate the context of the e-mail to the receiver?
Choose an option.
Address fields
Body
Importance
Subject
You've written a memo to notify staff of a new project they will be working on. You want to send the memo and keep a copy of it in a particular folder on your hard disk. What should you do?
Choose an option.
Save the memo as a draft
Send and file the memo
Send the memo
Send the memo with a request for delivery confirmation
Lotus Mail enables you to sort your memos using different criteria. Which criterion would you use to sort your Inbox messages alphabetically by sender?
Choose an option.
Date
Size
Subject
Who
You want to send a memo to Tom, Sarah, and Consuela. The memo is mainly directed at Tom but you want Sarah to receive it as well, with Tom knowing she has received it. You want Consuela to receive the memo without Tom and Sarah knowing that she did. How should you address this memo?
Choose an option.
Tom in the cc field, Sarah in the bcc field and Consuela in the cc field
Tom in the To field and Sarah and Consuela in the cc field
Tom in the To field, Sarah in the cc field, and Consuela in the bcc field
Tom in the To field, Sarah and Consuela in the bcc field
Choose an option.
Body
Importance
Subject
You've written a memo to notify staff of a new project they will be working on. You want to send the memo and keep a copy of it in a particular folder on your hard disk. What should you do?
Choose an option.
Send and file the memo
Send the memo with a request for delivery confirmation
Lotus Mail enables you to sort your memos using different criteria. Which criterion would you use to sort your Inbox messages alphabetically by sender?
Choose an option.
Size
Subject
Who
You want to send a memo to Tom, Sarah, and Consuela. The memo is mainly directed at Tom but you want Sarah to receive it as well, with Tom knowing she has received it. You want Consuela to receive the memo without Tom and Sarah knowing that she did. How should you address this memo?
Choose an option.
Tom in the To field and Sarah and Consuela in the cc field
Tom in the To field, Sarah in the cc field, and Consuela in the bcc field
星期三, 11月 03, 2010
Getting Help in Lotus Notes 7
1. Which tasks require you to obtain general Help?
Choose more than one option.
Finding out how to change the location preferences
Finding out more about dial-up settings (This was a correct option)
Searching for information about remote settings (This was a correct option)
Wanting to know how to create a signature
2. Which features belong to the general Help feature?
Choose more than one option.
Indexed (This was a correct option)
Searchable (This was a correct option)
Situation-relevant
Opens to default pages (This was a correct option)
3. You've been introduced to Lotus Notes, and you've decided to look into the Help to find out about it in general terms without looking for specific information. Which Help feature would you use?
Choose an option.
Contents (This was a correct option)
Index
Search
4. Which tasks would require you to obtain context-sensitive Help?
Choose more than one option.
Adding contacts to the Address Book (This was a correct option)
Discovering all about Instant Messaging
Finding information about hotspots
Moving documents to a new folder (This was a correct option)
Choose more than one option.
Finding out how to change the location preferences
Finding out more about dial-up settings (This was a correct option)
Searching for information about remote settings (This was a correct option)
Wanting to know how to create a signature
2. Which features belong to the general Help feature?
Choose more than one option.
Indexed (This was a correct option)
Searchable (This was a correct option)
Situation-relevant
Opens to default pages (This was a correct option)
3. You've been introduced to Lotus Notes, and you've decided to look into the Help to find out about it in general terms without looking for specific information. Which Help feature would you use?
Choose an option.
Contents (This was a correct option)
Index
Search
4. Which tasks would require you to obtain context-sensitive Help?
Choose more than one option.
Adding contacts to the Address Book (This was a correct option)
Discovering all about Instant Messaging
Finding information about hotspots
Moving documents to a new folder (This was a correct option)
星期二, 11月 02, 2010
Overview of Lotus Notes 7 Databases
1. You want to add a Spanish dictionary to Lotus Notes' default dictionaries. Which page of the User Preferences dialog box do you use?
Choose an option.
Basics
Calendar
International
Spell Check (This was the correct option)
2. You want to manage your mailbox so that you store all e-mails from different departments separately. Which feature of a database should you use?
Choose an option.
Documents
Folders (This was the correct option)
Panes
Views
3. Identify the feature of Lotus Notes databases that determines who can access the database.
Choose an option.
Access control lists (This was the correct option)
Documents, views, and folders
Templates
The .nsf file extension
4. Suppose you want to locate Jennifer Westlein's database of delivery addresses. Identify the various ways in which you can do this.
Choose more than one option.
By accessing the Open Database dialog box (This was the correct option)
By accessing the Delivery Addresses folder
By navigating to the Mail Threads view
By using the database icon on the Bookmark bar (This was the correct option)
Choose an option.
Basics
Calendar
International
Spell Check (This was the correct option)
2. You want to manage your mailbox so that you store all e-mails from different departments separately. Which feature of a database should you use?
Choose an option.
Documents
Folders (This was the correct option)
Panes
Views
3. Identify the feature of Lotus Notes databases that determines who can access the database.
Choose an option.
Access control lists (This was the correct option)
Documents, views, and folders
Templates
The .nsf file extension
4. Suppose you want to locate Jennifer Westlein's database of delivery addresses. Identify the various ways in which you can do this.
Choose more than one option.
By accessing the Open Database dialog box (This was the correct option)
By accessing the Delivery Addresses folder
By navigating to the Mail Threads view
By using the database icon on the Bookmark bar (This was the correct option)
星期一, 11月 01, 2010
Basic Features of Lotus Notes 7
1. Topic title: Basic Features of Lotus Notes 7
Your company's policies require that computers remain turned on at all times. What could you do to keep others from accessing your Lotus Notes user account, without turning off your computer?
Choose more than one option.
Lock the Notes Welcome page
2. Which Lotus Notes interface object enables you to display Instant Messaging options?
Choose an option.
Action button bar
Bookmark bar
3.
Which database enables you to store information that you don't necessarily want to share with the public?
Choose an option.
Calendar
Mail
4. What are the advantages of logging off Lotus Notes?
Choose more than one option.
Your company's policies require that computers remain turned on at all times. What could you do to keep others from accessing your Lotus Notes user account, without turning off your computer?
Choose more than one option.
Lock the Notes Welcome page
Exit Lotus Notes
Lock the Lotus Notes interface
Log out of Lotus Notes
2. Which Lotus Notes interface object enables you to display Instant Messaging options?
Choose an option.
Action button bar
Bookmark bar
Status bar
Toolbar3.
Which database enables you to store information that you don't necessarily want to share with the public?
Choose an option.
Calendar
Personal Journal
To Do list4. What are the advantages of logging off Lotus Notes?
Choose more than one option.
All open databases are closed
All open views are left openOther people can log on
Protects your documents
星期二, 9月 28, 2010
Security responsibilities and responses: A user's view
1. Which of the following actions would help users to keep information safe?
Choose more than one option.
Keep important information stored separately in hard copy form
2. Which of the following should be part of the effort to reduce the level of threat to security posed by an organization's own employees?
Choose more than one option.
3. Which of the following are key considerations for an information security program?
Choose more than one option.
4. Which of the following are criteria for a good password?
Choose more than one option.
Topic title: Security responsibilities and responses: A user's view
Which of the following are considered potential security threats?
Choose more than one option.
Keep important information stored separately in hard copy form
Have a strong password
Be careful about leaving your computer unattended
Report anything suspicious
2. Which of the following should be part of the effort to reduce the level of threat to security posed by an organization's own employees?
Choose more than one option.
Keep employees motivated
Ensure that employees' skills are updated on an ongoing basis
Monitor employee activity
Install appropriate technical barriers
3. Which of the following are key considerations for an information security program?
Choose more than one option.
Confidentiality
Availability
Communication Integrity
4. Which of the following are criteria for a good password?
Choose more than one option.
It is almost impossible for others to guess
It has personal significance You don't have to write it down
It evokes a pleasant, thus memorable, image Topic title: Security responsibilities and responses: A user's view
Which of the following are considered potential security threats?
Computer viruses
Internet privilege
Loss of data Unauthorized access
星期一, 9月 27, 2010
Introduction to security policies
1. Security ___________ define which of a company's resources are to be protected, whereas security _________ define how to protect them.
To fill the first blank, select one of the options below. The other option will automatically appear in the second blank.
procedures
policies
Security policies define which of a company's resources are to be protected, whereas security procedures define how to protect them.
2. Which of the following should be the first step in developing a security policy?
Choose an option.
Assigning risk factors
Prioritizing resources
3. Which of the following statements best describes a company's information protection policy?
Choose an option.
It defines methods of remotely connecting to the main network
It provides guidelines on how users should process, store, and transmit sensitive information
It provides guidelines for reporting and managing virus infections
It defines the appropriate use of computing resources
To fill the first blank, select one of the options below. The other option will automatically appear in the second blank.
procedures
policies
Security policies define which of a company's resources are to be protected, whereas security procedures define how to protect them.
2. Which of the following should be the first step in developing a security policy?
Choose an option.
Assigning risk factors
Prioritizing resources
Classifying resources
Defining acceptable and unacceptable activities 3. Which of the following statements best describes a company's information protection policy?
Choose an option.
It defines methods of remotely connecting to the main network
It provides guidelines on how users should process, store, and transmit sensitive information
It provides guidelines for reporting and managing virus infections
It defines the appropriate use of computing resources
星期日, 9月 26, 2010
Identifying Internet security measures
1. Which of the following involves users submitting their usernames and passwords in encrypted form?
Choose an option.
Anonymous access
Basic authentication
2. You use your ________ to decrypt messages you receive.
You send your _________ to the people from whom you expect to receive an encrypted message.
To fill the first blank, select one of the options below. The other option will automatically appear in the second blank.
private key
public key
You use your private key to decrypt messages you receive.
You send your public key to the people from whom you expect to receive an encrypted message.
3. A digital certificate contains which of the following?
Choose more than one option.
Choose an option.
Anonymous access
Basic authentication
Secure authentication
Digital certificates 2. You use your ________ to decrypt messages you receive.
You send your _________ to the people from whom you expect to receive an encrypted message.
To fill the first blank, select one of the options below. The other option will automatically appear in the second blank.
private key
public key
You use your private key to decrypt messages you receive.
You send your public key to the people from whom you expect to receive an encrypted message.
3. A digital certificate contains which of the following?
Choose more than one option.
A certificate serial number
A certificate expiration date
Your private key The certificate authority's digital signature
星期六, 9月 25, 2010
Threats to data on networked computers
1. A _________ is a simple destructive miniature program that infiltrates its way into computer systems.
Choose an option below to fill in the blank.
VPN
hacker
IP address
2. Which of the following statements regarding hackers are true?
Choose more than one option.
They always gain access to system resources from outside
3. What do ethical hackers do?
Choose an option.
Try to break into systems so as to defraud companies
Impersonate authorized users using a spoof IP address in order to breach system security
Choose an option below to fill in the blank.
VPN
hacker
IP address
virus
2. Which of the following statements regarding hackers are true?
Choose more than one option.
They always gain access to system resources from outside
They use Internet message boards to gain information on system security holes
They impersonate authorized users to gain access to systems
They all aim to defraud the companies whose systems they penetrate 3. What do ethical hackers do?
Choose an option.
Try to break into systems so as to defraud companies
Test a system's security to see where malicious hackers could gain access
Create antivirus software Impersonate authorized users using a spoof IP address in order to breach system security
星期五, 9月 24, 2010
Threats and security risks on the Web
1. Which web browser setting controls how a web browser receives information that is automatically saved to your hard disk?
Proxy
Mail server
2. A macro virus will typically affect the file currently open on your computer.
A boot-sector virus infects a portion of your hard disk.
To fill the first blank, select one of the options below. The other option will automatically appear in the second blank.
macro
boot-sector
3. Which of the following terms describes information about a user that is stored on a client machine by a web browser?
Choose an option.
A MIME
A certificate
4. Why is it important to frequently update the virus definition files on your virus protection software?
Choose an option.
To prevent hacking attempts
To automatically patch your word-processing software
Cookies
Security Proxy
Mail server
2. A macro virus will typically affect the file currently open on your computer.
A boot-sector virus infects a portion of your hard disk.
To fill the first blank, select one of the options below. The other option will automatically appear in the second blank.
macro
boot-sector
3. Which of the following terms describes information about a user that is stored on a client machine by a web browser?
Choose an option.
A cookie
A cache A MIME
A certificate
4. Why is it important to frequently update the virus definition files on your virus protection software?
Choose an option.
To prevent hacking attempts
To keep abreast of the newest viruses
To prevent viruses from infecting your CD-ROMs To automatically patch your word-processing software
星期四, 9月 23, 2010
Introduction to network security threats
1. Which of the following definitions refers to data becoming corrupt due to incorrect inputting procedures?
Choose an option.
Malicious threat
Inappropriate activity
Nuisance threat
2. Which of the following terms describes the event whereby a hacker installs a virus on your computer and then tries to make you inadvertently activate it?
Choose an option.
Denial of Service (DoS)
E-mail spoofing
3. Which of the following should be disabled in order to discern whether a file is a virus?
Choose an option.
Hide file extensions for known file types in Windows
Java, JavaScript, and Active X in browsers
Denial of Service (DoS)
Chat sites
Choose an option.
Malicious threat
Inappropriate activity
Nuisance threat
Accidental loss
2. Which of the following terms describes the event whereby a hacker installs a virus on your computer and then tries to make you inadvertently activate it?
Choose an option.
Denial of Service (DoS)
Trojan horse
Packet sniffing E-mail spoofing
3. Which of the following should be disabled in order to discern whether a file is a virus?
Choose an option.
Hide file extensions for known file types in Windows
Java, JavaScript, and Active X in browsers
Denial of Service (DoS)
Chat sites
星期三, 9月 22, 2010
Network security components
1. In symmetrical encryption, a private key is used, whereas in asymmetrical encryption, both public and private keys are used.
To fill the first blank, select one of the options below. The other option will automatically appear in the second blank.
asymmetrical
symmetrical
2. Which of the following steps can be implemented to prevent virus attacks?
Choose more than one option.
Prevent unauthorized users accessing the Internet
Use access control
3. Which of the following is a collection of components that acts as a barrier between a private network and the outside world?
Choose an option.
Encrypted tunnel
Virus
4. When you receive a message encrypted by the sender's private key, you decrypt it using the sender's public key.
Choose an option below to fill in the blank.
private
public
5. IDS systems work by calculating baselines for each of the parameters monitored. Your system is said to be operating normally when the parameter values recorded are within the baselines.
Choose an option below to fill in the blank.
outside
within
6. Which of the following are common user authentication systems?
Choose more than one option.
To fill the first blank, select one of the options below. The other option will automatically appear in the second blank.
asymmetrical
symmetrical
2. Which of the following steps can be implemented to prevent virus attacks?
Choose more than one option.
Prevent unauthorized users accessing the Internet
Use access control
Use software packages to immunize your system
Use virus scanners to search for viruses each time you boot up
3. Which of the following is a collection of components that acts as a barrier between a private network and the outside world?
Choose an option.
Encrypted tunnel
Firewall
Virtual Private Network (VPN) Virus
4. When you receive a message encrypted by the sender's private key, you decrypt it using the sender's public key.
Choose an option below to fill in the blank.
private
public
5. IDS systems work by calculating baselines for each of the parameters monitored. Your system is said to be operating normally when the parameter values recorded are within the baselines.
Choose an option below to fill in the blank.
outside
within
6. Which of the following are common user authentication systems?
Choose more than one option.
Biometrics
Digital signatures Passwords
Personal tokens
星期二, 9月 21, 2010
Overview of the Internet
1. Which of the following is a valid IP address?
Choose an option.
204.115
204.115.34
2. Which protocol is used by computers on the Internet to communicate with each other?
Choose an option.
IPX/SPX
NetBEUI
3. The SMTP protocol is used for which of the following?
Transferring incoming e-mail messages from a mail server to a mail client
4. What is the correct URL syntax for a company called Imagenie?
http://www.imagenie.com
www/imagenie/com
5. __________ is the protocol used between a web server and a web browser when web pages are downloaded during a web browsing session.
Choose an option below to fill in the blank.
HTML
Telnet
6. Let's say that you need to establish a web site that your employees can use to see human resources information and internal documents.
Which type of site should you create to do this?
Choose an option.
An Internet site
A virtual private network
7. Which of the following must you have to access an extranet?
Choose more than one option.
8. are networks that are partially accessible to authorized outsiders.
Choose an option below to fill in the blank.
Internets
9. Which TCP/IP protocol is used for sending and receiving newsgroup messages?
FTP
HTTP
LDAP
Choose an option.
204.115
204.115.34
204.115.34.10
204.115.34.10.1022. Which protocol is used by computers on the Internet to communicate with each other?
Choose an option.
IPX/SPX
NetBEUI
TCP/IP
DECNet 3. The SMTP protocol is used for which of the following?
Sending e-mail messages between mail servers
Transferring outgoing e-mail messages from a client to a server
Exchanging newsgroup messages Transferring incoming e-mail messages from a mail server to a mail client
4. What is the correct URL syntax for a company called Imagenie?
http://www.imagenie.com
http//www.imagenie.com
imagenie@www.http.com www/imagenie/com
5. __________ is the protocol used between a web server and a web browser when web pages are downloaded during a web browsing session.
Choose an option below to fill in the blank.
HTML
HTTP
FTP Telnet
6. Let's say that you need to establish a web site that your employees can use to see human resources information and internal documents.
Which type of site should you create to do this?
Choose an option.
An Internet site
An intranet
An extranet A virtual private network
7. Which of the following must you have to access an extranet?
Choose more than one option.
The correct URL
A valid username
A password
A digital certificate 8. are networks that are partially accessible to authorized outsiders.
Choose an option below to fill in the blank.
Internets
Extranets
Intranets 9. Which TCP/IP protocol is used for sending and receiving newsgroup messages?
FTP
HTTP
LDAP
NNTP
星期一, 9月 06, 2010
The DB2 database creation process
1. What can you conclude about a database that is physically stored in the path segment \BROCDB\NODE0000\SQL00004\?
It is the fourth database created within this path
The database is not partitioned
The instance name is BROC
The tablespaces are SMS
2. Suppose you've created a nonpartitioned database on the E drive called BROCDB. What will the path name be?
Local Disk (E:)/BROCDB/NODE0000
Local Disk (E:)/BROCDB/NODE0001
Local Disk (E:)/NODE0000/BROCDB
Local Disk (E:)/NODE0001/BROCDB
3. You are in the process of creating a database, and the database configuration file has just been initialized. Which tasks will complete the creation of the database?
Binding certain utility programs to the database
Cataloging the database
Creating system tablespaces
Granting authorities and privileges to the appropriate users
4. Which database recovery file stores information about the buffer pool?
SQLBP.1
SQLDBCON
SQLINSLK
SQLSPCS.1
5. What is the function of SYSCATSPACE1?
To provide temporary storage for reorganizing tables
To store system views and catalog tables
To store user-defined objects
6. You're creating a database, and the buffer pool has just been created. Which of these tasks have been completed at this stage of the process?
All the files needed for database recovery have been created
Authorities and privileges have been granted to the appropriate users
Four default schemas have been created
The database has been cataloged in the system and local database directory
It is the fourth database created within this path
The database is not partitioned
The instance name is BROC
The tablespaces are SMS
2. Suppose you've created a nonpartitioned database on the E drive called BROCDB. What will the path name be?
Local Disk (E:)/BROCDB/NODE0000
Local Disk (E:)/BROCDB/NODE0001
Local Disk (E:)/NODE0000/BROCDB
Local Disk (E:)/NODE0001/BROCDB
3. You are in the process of creating a database, and the database configuration file has just been initialized. Which tasks will complete the creation of the database?
Binding certain utility programs to the database
Cataloging the database
Creating system tablespaces
Granting authorities and privileges to the appropriate users
4. Which database recovery file stores information about the buffer pool?
SQLBP.1
SQLDBCON
SQLINSLK
SQLSPCS.1
5. What is the function of SYSCATSPACE1?
To provide temporary storage for reorganizing tables
To store system views and catalog tables
To store user-defined objects
6. You're creating a database, and the buffer pool has just been created. Which of these tasks have been completed at this stage of the process?
All the files needed for database recovery have been created
Authorities and privileges have been granted to the appropriate users
Four default schemas have been created
The database has been cataloged in the system and local database directory
訂閱:
意見 (Atom)