题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-11-18 06:51:51

[多项选择]Which two statements regarding asymmetric key encryption are true?() (Choose two.)
A. The same key is used for encryption and decryption.
B. It is commonly used to create digital certificate signatures.
C. It uses two keys: one for encryption and a different key for decryption.
D. An attacker can decrypt data if the attacker captures the key used for encryption.

更多"Which two statements regarding asym"的相关试题:

[多项选择]Which two statements regarding symmetric key encryption are true?() (Choose two.)
A. The same key is used for encryption and decryption.
B. It is commonly used to create digital certificate signatures.
C. It uses two keys: one for encryption and a different key for decryption.
D. An attacker can decrypt data if the attacker captures the key used for encryption.
[多项选择]Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
A. Up to three external authentication server types can be used simultaneously.
B. Only one external authentication server type can be used simultaneously.
C. If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.
D. If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.
[多项选择]Which two statements regarding JUNOS architecture are correct?()
A. The Routing Engine handles all exception traffic.
B. The Routing Engine synchronizes the route table with the PFE
C. The Routing Engine is hot-pluggable.
D. The Routing Engine controls the PFE
[多项选择]Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
A. A client group is a list of clients associated with a group.
B. A client group is a list of groups associated with a client.
C. Client groups are referenced in security policy in the same manner in which individual clients are referenced.
D. Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
[多项选择]Which two statements regarding the Flashback Table feature are correct?()
A. Flashback Table can be performed on system tables.
B. Flashback Table operation does not shrink the segments.
C. Flashback Table uses log mining to extract SQL_REDO and SQL_UNDO statements.
D. Flashback Table operation acquires exclusive data manipulation language (DML) locks.
[多项选择]Which two statements regarding traceroute on JUNOS devices are correct?()
A. Traceroute transmits ICMP echo-request packets.
B. Traceroute transmits UDP packets.
C. Traceroute receives ICMP echo-reply packets.
D. Traceroute receives ICMP port-unreachable packets.
[多项选择]Which two statements are true regarding interface properties? ()
A. MTU and speed must be configured under each unit.
B. Physical parameters such as MTU, duplex mode, and speed are configured under the interface name.
C. IP and IPv6 addresses are configured under a unit-number.
D. DLCI numbers, VPI/VCI values, and VLAN tags are physical parameters.
[多项选择]Which two statements are true regarding ownership of shared entities? ()(Choose two.)
A. Customers is owned by Oracle Human Resources whereas Locations is owned by Oracle Receivables.
B. Items is owned by Oracle Purchasing whereas Locations is owned by Oracle Receivables.
C. Sales Force is owned by Oracle Order Management whereas Employees is owned by Oracle Human Resources.
D. Set of books is owned by Oracle General Ledger whereas Locations is owned by Oracle Human Resources.
E. Suppliers is owned by Oracle Purchasing whereas Units of Measure is owned by Oracle Inventory.
[多项选择]Which two statements are correct regarding default protocol preference values?()
A. OSPF has a single preference value for both internal and external routes.
B. RIP is preferred over OSPF external routes.
C. Direct, local, and static routes have the same preference value.
D. OSPF's preference value is lower than BGP (both IBGP and EBGP).
[多项选择]Which two statements are true regarding partitioning in Mysql?()
A. Tables with BLOB and TEXT columns cannot be partitioned
B. Partitioning allows easier management of smaller data sets for certain queries
C. Partitioning allows different columns to be stored in separate files
D. The partitioning expression is an integer or function that returns an integer value or NULL value
E. Partitioning is only available for those storage engines that implements it natively
[多项选择]Which two statements are true regarding routing tables?()
A. The routing table is populated by the forwarding table.
B. Devices running the Junos OS can accommodate multiple routing tables.
C. Information learned from routing protocols is stored in the routing table.
D. The primary routing table for IPv4 unicast routes is inet.4.
[多项选择]Which two statements are true regarding an Ethernet collision domain?()
A. If a switch is used, the collision domain includes all devices connected to the switch.
B. If a hub is used, the collision domain includes all devices connected to the hub.
C. If a hub is used, the collision domain is limited to each device and the hub.
D. If a switch is used, the collision domain is limited to each device and the switch.
[多项选择]Which two statements are true regarding the functionality of the remap command in ASMCMD?()
A. It repairs blocks that have read disk I/O errors.
B. It checks whether the alias metadata directory and the file directory are linked correctly.
C. It repairs blocks by always reading them from the mirror copy and writing them to the original location.
D. It reads the blocks from a good copy of an ASM mirror and rewrites them to an alternate location on disk if the blocks on the original location cannot be read properly.
[多项选择]Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
A. Traffic is permitted from the trust zone to the untrust zone.
B. Intrazone traffic in the trust zone is permitted.
C. All traffic through the device is denied.
D. The policy is matched only when no other matching policies are found.
[多项选择]Which two statements are true regarding the ORDER BY clause? ()
A. The sort is in ascending by order by default.
B. The sort is in descending order by default.
C. The ORDER BY clause must precede the WHERE clause.
D. The ORDER BY clause is executed on the client side.
E. The ORDER BY clause comes last in the SELECT statement.
F. The ORDER BY clause is executed first in the query execution.
[多项选择]Which two statements are true regarding trace options on Junos devices?()
A. You can see the contents of the log file by entering the show log command.
B. Trace options will send information to your screen automatically.
C. Trace options are limited to one protocol at a time.
D. The file name and a set of flags may be specified when enabling traceoptions.

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码