更多"Which two statements regarding exte"的相关试题:
[多项选择]Which of the following statements about authentication responses and conditions is true?()(Choose two.)
A. When a router receives a failure response, it stops querying authentication methods.
B. When a router receives an error response, it stops querying authentication methods.
C. If the router receives a failure response from an authentication method, it queries the next method.
D. The router does not differentiate between failure and error responses; the authentication process is always interrupted.
E. If it receives no response from the authentication method, a router will determine the error condition on its own; the router also has the option to proceed to the next method in a list if configured accordingly.
[多项选择]Which two statements regarding JUNOS architecture are correct?()
A. The Routing Engine handles all exception traffic.
B. The Routing Engine synchronizes the route table with the PFE
C. The Routing Engine is hot-pluggable.
D. The Routing Engine controls the PFE
[多项选择]Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
A. A client group is a list of clients associated with a group.
B. A client group is a list of groups associated with a client.
C. Client groups are referenced in security policy in the same manner in which individual clients are referenced.
D. Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
[多项选择]Which two statements regarding the Flashback Table feature are correct?()
A. Flashback Table can be performed on system tables.
B. Flashback Table operation does not shrink the segments.
C. Flashback Table uses log mining to extract SQL_REDO and SQL_UNDO statements.
D. Flashback Table operation acquires exclusive data manipulation language (DML) locks.
[多项选择]Which two statements regarding symmetric key encryption are true?() (Choose two.)
A. The same key is used for encryption and decryption.
B. It is commonly used to create digital certificate signatures.
C. It uses two keys: one for encryption and a different key for decryption.
D. An attacker can decrypt data if the attacker captures the key used for encryption.
[多项选择]Which two statements regarding asymmetric key encryption are true?() (Choose two.)
A. The same key is used for encryption and decryption.
B. It is commonly used to create digital certificate signatures.
C. It uses two keys: one for encryption and a different key for decryption.
D. An attacker can decrypt data if the attacker captures the key used for encryption.
[多项选择]Which two statements regarding traceroute on JUNOS devices are correct?()
A. Traceroute transmits ICMP echo-request packets.
B. Traceroute transmits UDP packets.
C. Traceroute receives ICMP echo-reply packets.
D. Traceroute receives ICMP port-unreachable packets.
[多项选择]Which two statements are true regarding interface properties? ()
A. MTU and speed must be configured under each unit.
B. Physical parameters such as MTU, duplex mode, and speed are configured under the interface name.
C. IP and IPv6 addresses are configured under a unit-number.
D. DLCI numbers, VPI/VCI values, and VLAN tags are physical parameters.
[多项选择]Which two statements are true regarding ownership of shared entities? ()(Choose two.)
A. Customers is owned by Oracle Human Resources whereas Locations is owned by Oracle Receivables.
B. Items is owned by Oracle Purchasing whereas Locations is owned by Oracle Receivables.
C. Sales Force is owned by Oracle Order Management whereas Employees is owned by Oracle Human Resources.
D. Set of books is owned by Oracle General Ledger whereas Locations is owned by Oracle Human Resources.
E. Suppliers is owned by Oracle Purchasing whereas Units of Measure is owned by Oracle Inventory.
[多项选择]Which two statements are true regarding redundancy groups? ()(Choose two.)
A. When priority settings are equal and the members participating in a cluster are initialized at the same time, the primary assigned to node 0.
B. The preempt option determines the primary and secondary roles for redundancy group 0 during a failure and recovery
C. Redundancy group 0 manages the control plane failover between the nodes of a cluster.
D. The primary role can be shared for redundancy group 0 when the active-active option is enabled.
[多项选择]Which two statements are correct regarding default protocol preference values?()
A. OSPF has a single preference value for both internal and external routes.
B. RIP is preferred over OSPF external routes.
C. Direct, local, and static routes have the same preference value.
D. OSPF's preference value is lower than BGP (both IBGP and EBGP).
[多项选择]Which two statements are true regarding partitioning in Mysql?()
A. Tables with BLOB and TEXT columns cannot be partitioned
B. Partitioning allows easier management of smaller data sets for certain queries
C. Partitioning allows different columns to be stored in separate files
D. The partitioning expression is an integer or function that returns an integer value or NULL value
E. Partitioning is only available for those storage engines that implements it natively
[多项选择]Which two external authentication methods are supported by the Junos OS for user authentication?()
A. RADIUS
B. KERBEROS
C. LDAP
D. TACACS+