更多"Which four are valid Oracle constra"的相关试题:
[多项选择]Which four are valid Oracle constraint types? ()
A. CASCADE
B. UNIQUE
C. NONUNIQUE
D. CHECK
E. PRIMARY KEY
F. CONSTANT
G. NOT NULL
[多项选择]Which of the following are valid program types for a lightweight job?()
A. PLSQL_BLOCK PLSQL
B. EXECUTABLE
C. JAVA_STORED_PROCEDURE
D. STORED_PROCEDURE
E. EXTERNAL
[多项选择]Which four are types of functions available in SQL? ()
A. string
B. character
C. integer
D. calendar
E. numeric
F. translation
G. date
H. conversion
[多项选择]Which three TLV types are valid in an IS-IS Hello PDU?()
A. TLV 10 Authentication
B. TLV 1 Area Addresses
C. TLV 211 Graceful Restart
D. TLV 137 Dynamic Hostname Resolution
E. TLV 14 ABRs
[多项选择]Which three types of integration does the Business Event System support?() (Choose three.)
A. point-to-point
B. parent/child messaging
C. messaging hub system
D. distributed applications messaging
E. simple object access protocol (SOAP) messaging
[多项选择]Which three types of content filtering are supported only for HTTP? ()(Choose three.)
A. block Flash
B. block Java applets
C. block ActiveX
D. block EXE files
E. block MIME type
[多项选择]Which encapsulation types are configurable on a Cisco switch for a trunk?()
A. VTP
B. ISL
C. CDP
D. 802.1Q
E. 802.1p
F. LLC
G. IETF
[多项选择]Which three types of files can be automatically placed in the flash recovery area (fast recovery area in 11g Release 2)?() (Choose three.)
A. Alert log file
B. Archived redo log files
C. Control file autobackups
D. Server Parameter file (SPFILE)
E. Recovery Manager (RMAN) backup piece
[多项选择]Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()
A. Session-Export policies on the Junos Pulse Secure Access Service
B. Session-Export policies on the Junos Pulse Access Control Service
C. Session-Import policies on the Junos Pulse Secure Access Service
D. Session-Import policies on the Junos Pulse Access Control Service
E. Resource access policies on the Junos Pulse Access Control Service
[多项选择]Which two types of attacks are considered to be denial of service?() (Choose two.)
A. zombie agents
B. SYN flood
C. IP packet fragments
D. WinNuke
[多项选择]Which two types of optimization does the WX 60 device perform when Exchange 2003 and Outlook 2003 areused in the network? ()(Choose two.)
A. Packet Flow Acceleration
B. Network Sequence Caching
C. AppFlow's MAPI acceleration
D. Molecular Sequence Reduction
[多项选择]Which three types of optimization does the WX 60 device perform when Exchange 2000 and Outlook 2000 are used in the network? ()(Choose three.)
A. Fast Connection Setup
B. TCP Acceleration (AFP)
C. Network Sequence Caching
D. AppFlow's MAPI acceleration
E. Molecular Sequence Reduction
[多项选择] Into which two types of areas would an area border router (ABR) inject a default route?()
A. stub
B. the autonomous system of an exte rior gateway protocol (EGP)
C. NSSA
D. totally stubby
E. the autonomous system of a different interior gateway protocol (IGP)
F. area 0
[多项选择]Which two types of nodes are included in an MPLS explicit route? ()(Choose two.)
A. peer
B. strict
C. loose
D. system
[多项选择]Which four types of objects can be thrown using the throw statement?()
A. Error
B. Event
C. Object
D. Exception
E. Throwable
F. RuntimeException
[多项选择]Which two media types support asynchronous transfer mode?()
A. T3
B. SONET
C. Gigabit-Ethernet
D. EIA/TIA-232 serial