Which the security mechanism uses the concept of a realm?()
A、 authorization
B、 data integrity
C、 confidentiality
D、 authentication
A、 authorization
B、 data integrity
C、 confidentiality
D、 authentication
A、The hscroot user password. B、The CE password. C、The HMC password. D、The ASM admin password.
A、A.@Number(Date)-30 B、B.@Adjust(Date;0;0;30;0;0;0) C、C.@Adjust(Date;0;0;-30;0;0;0) D、D.@If(Date!="";Date-30;@Failure(There is no current release date"))
A、A.For both the CustomerDB database and the master database, enable Transparent Database Encryption. B、B.You should use the built-in encryption functions to encrypt the sensitive data at the cell level. C、C.You should make the CustomerDB database accessible only through stored procedures and functions. D、D.For the CustomerDB database, enable Transparent Database Encryption and back up the transaction log.
A、the distance between the spots. B、which paper tray was used to print the document. C、which driver was used to print the document. D、which application was used to print the document.
A、Set the NSORDER environmental variable of the environment which invokes the process to:NSORDER="local,nis,bind" B、Set the NSORDER environmental variable of the environment which invokes the process to: NSORDER="hosts=auth,nis,bind" C、Edit /etc/netsvc.conf to add a line similar to the following: process /full/path/of/process {hosts=local,nis,dns} D、Unset NSORDER environment variable of the environment which invokes the process
A、the session layer B、the protocol layer C、the data link layer D、the access layer E、the network layer F、the application layer