更多"Which three static objects are cach"的相关试题:
[多项选择]Which three statements correctly describe the functions and use of constraints? ()
A. Constraints provide data independence.
B. Constraints make complex queries easy.
C. Constraints enforce rules at the view level.
D. Constraints enforce rules at the table level.
E. Constraints prevent the deletion of a table if there are dependencies.
F. Constraints prevent the deletion of an index if there are dependencies.
[多项选择]Which three applications are disabled for compression by default?() (Choose three.)
A. FTP
B. SSH
C. UDP
D. HTTPS
E. Traceroute
[多项选择]Which three characteristics are indicators that a potential SMB customer is in the SBR-defined growth phase? ()
A. focusing on becoming more efficient
B. wanting greater connectivity for customers
C. requesting convergence of voice and data
D. providing a customer with a basic up-to-date website
E. needing rapid secure access to customer history, data, or buying behavior
[多项选择]Which three statements about dynamic filtering are true? ()
A. Dynamic filtering creates a query statement.
B. Dynamic filtering has an option to save query.
C. Dynamic filtering can select any log field to filter.
D. Dynamic filtering permanently removes other log entries.
E. Dynamic filtering redraws the log when you select a variable link.
[多项选择]Which three mechanisims support the forwarding plane of a Layer 3 VPN in JUNOS software? ()
A. MPLS LSP
B. ATM tunnel
C. GRE tunnel
D. IPSEC tunnel
E. L2TPv3 session
[多项选择]Which three user authentication methods are supported by the Junos OS?()
A. RADIUS
B. CHAP
C. local user database
D. TACACS+
E. PAP
[多项选择]Which three are true?()
A. A MERGE statement is used to merge the data of one table with data from another.
B. A MERGE statement replaces the data of one table with that of another.
C. A MERGE statement can be used to insert new rows into a table.
D. A MERGE statement can be used to update existing rows in a table.
[多项选择]Which three configuration steps must be completed for a Cisco router in order to enable local AAA login authentication?() (Choose three.)
A. Apply the method list to an interface
B. Specify the default method list and apply it to the interface
C. Enable AAA
D. Define a method list
[多项选择]Which three applications or protocols are accelerated by AppFlow?() (Choose three.)
A. UNIX NFS protocol
B. Web-based e-mail
C. Secure Sockets Layer
D. Microsoft's Common Internet File System
E. Microsoft's Messaging Application Programming Interface
[多项选择]Which three authentication resources are grouped within an authentication realm?()
A. Authentication enforcer
B. Directory server
C. Captive authentication
D. Authentication policy
E. Role-mapping rules
[多项选择]Which three resources might be prioritized between competing pluggable databases when creating amultitenant container database plan (CDB plan) using Oracle Database Resource Manager?()
A. Maximum Undo per consumer group
B. Maximum Idle time
C. Parallel server limit
D. CPU
E. Exadata I/O
F. Local file system I/O
[多项选择]Which three connection options are available when configuring a switch port to be part of aprivate VLAN? ()(Choose three.)
A. is olated mode
B. switchport mode
C. modular mode
D. community mode
E. promiscuous mode
F. global mode
[多项选择]Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()
A. LDAP
B. S/Key
C. TACACS+
D. RADIUS
E. SiteMinder
[多项选择]Which three statements describe the User Datagram Protocol (UDP)?()
A. UDP provides delivery notification and error checking mechanisms.
B. UDP is faster than the Transmission Control Protocol (TCP).
C. UDP application examples include DNS and VoIP.
D. UDP is an application layer protocol.
E. UDP uses a best effort delivery approach.
[多项选择]Which three statements accurately describe layer 2 Ethernet switches?()
A. Microsegmentation decreases the number of collisions on the network.
B. if a switch receives a frame for an unkown destination,it uses ARP to resolve the address.
C. Spanning Tree Protocol allows switches to automatically share vlan information.
D. In a properly functioning network with redundant switched paths,each switched aegment will contain one root bridge with all its ports in the forwarding state.All other switches in that broadcast domain will have only one root port.
E. Establishing vlans increases the number of broadcast domains.
F. Switches that are configured with vlans make forwarding decisions based on both layer 2 and layer 3 address information.
[多项选择]Which three statements are correct about Rate Limiters? ()(Choose three.)
A. one-rate rate limiters
B. two-rate rate limiters
C. two-rate rate limiters is the default
D. one-rate rate limiters is the default
E. there is no default it must be configured
[多项选择]Which three statements are true concerning the multitenant architecture?()
A. Each pluggable database (PDB) has its own set of background processes.
B. A PDB can have a private temp tablespace.
C. PDBs can share the sysaux tablespace.
D. Log switches occur only at the multitenant container database (CDB) level.
E. Different PDBs can have different default block sizes.
F. PDBs share a common system tablespace.
G. Instance recovery is always performed at the CDB level.