Tag Archives: user

The SCOTT/TIGER user exists in two databases, BOSTON_DB and DALLAS_DB, in two different locations. Each

The SCOTT/TIGER user exists in two databases, BOSTON_DB and DALLAS_DB, in two different locations.Each database has a tnsnames.ora file defining DALLAS_DB as a service name.Examine this command:CREATE DATABASE LINK dblink1 CONNECT TO scott IDENTIFIED BY tiger USING ‘dallas_db’; How do you execute the command so that only SCOTT in BOSTON_DB can access the SCOTT schema in DALLAS_DB? A.… Read More »

Consider this method declaration: (Exhibit) A) "SET SESSION AUTHORIZATION " + user B) "SET SESSION AUTHORIZATION

Consider this method declaration:A) “SET SESSION AUTHORIZATION ” + userB) “SET SESSION AUTHORIZATION ” + stmt.enquoteIdentifier(user)Is A or B the correct replacement for <EXPRESSION> and why? A. B, because all values provided by the calling code should be enquoted. B. A, because it is unnecessary to enclose identifiers in quotes. C. A, because it sends exactly the value… Read More »

Your policy model includes this rule: the user is a minor if the user's age &lt; 18 Which two statements

Your policy model includes this rule:the user is a minor ifthe user’s age < 18Which two statements are true? A. “the user is a minor” is a number attribute. B. “the user’s age” should be a date attribute. C. If you use “the user’s age” in a Word document without first defining it in Policy Automation, you will… Read More »

You are the admin user of an Autonomous Database (ADB) instance. A new business analyst has joined the

You are the admin user of an Autonomous Database (ADB) instance. A new business analyst has joined the team and would like to explore ADB tables using SQL Developer Web.What steps do you need to take? A. Create a database user (with connect, resource, object privileges), enable the schema to use SQL Developer and provide the user with… Read More »

In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one AP to another on a different access switch using a single WLC?

A. Layer 3 B. inter-xTR C. auto anchor D. fast roam Answer: Option D. Explanation:  No answer description available for this question Show AnswerDiscussion The post In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one AP to another on a different access switch using a single WLC? appeared first on… Read More »

Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?

A. Cisco Firepower and FireSIGHT B. Cisco Stealthwatch system C. Advanced Malware Protection D. Cisco Web Security Appliance Answer: Option B. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis? appeared first on Majanto.

An administrator needs to give the same level of access to the network devices when users are logging into them using TACACS+. However, the administrator must restrict certain commands based on one of three user roles that require different commands. How is this accomplished without creating too many objects using Cisco ISE?

A. Create one shell profile and one command set. B. Create multiple shell profile and one command set. C. Create multiple shell profile and multiple command sets. D. Create one shell profile and multiple command sets. Answer: Option C. Explanation:  Reference: https://www.cisco.eom/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/ b_ise_admin_guide_20_chapter_0100010.html Show AnswerDiscussion The post An administrator needs to give the same level of access to… Read More »

What happens when an internal user is configured with an external identity store for authentication, but an engineer uses the Cisco ISE admin portal to select an internal identity store as the identity source?

A. Authentication is redirected to the internal identity source. B. Authentication is granted. C. Authentication fails. D. Authentication is redirected to the external identity source. Answer: Option D. Explanation:  No answer description available for this question Show AnswerDiscussion The post What happens when an internal user is configured with an external identity store for authentication, but an engineer… Read More »