更多"Which two statements about the Adap"的相关试题:
[多项选择]Which three statements are true about adaptive SQL plan management?()
A. It automatically performs verification or evolves non-accepted plans, in COMPREHENSIVE mode when they perform better than existing accepted plans.
B. The optimizer always uses the fixed plan, if the fixed plan exists in the plan baseline.
C. It adds new, bettor plans automatically as fixed plans to the baseline.
D. The non-accepted plans are automatically accepted and become usable by the optimizer if they perform better than the existing accepted plans.
E. The non-accepted plans in a SQL plan baseline are automatically evolved, in COMPREHENSIVE mode, during the nightly maintenance window and a persistent verification report is generated.
[多项选择]Which two statements about login classes correctly define their usage within the JUNOS software?()
A. A different login class must be configured for each user.
B. Individual commands can be explicitly allowed or denied.
C. A user must be assigned to one of the default login classes.
D. Each login class is associated with one or more permissions flags.
[多项选择]Which two statements about route redistribution when implementing OSPF are true?()
A. Routes learned using any IP routing protocol can only be redistributed into non IP routing protocols.
B. OSPF can import routes learned using EIGRP, RIP, and IS - IS.
C. OSPF routes cannot be exported into EIGRP, RIP, an d IS - IS.
D. At the interdomain level, OSPF cannot import routes learned using BGP.
E. OSPF routes can be exported into BGP.
[多项选择]Which two statements about creating constraints are true?()
A. Constraint names must start with SYS_C
B. All constraints must be defines at the column level.
C. Constraints can be created after the table is created.
D. Constraints can be created at the same time the table is created.
E. Information about constraints is found in the VIEW_CONSTRAINTS dictionary view.
[多项选择]Which two statements about the track configuration option are correct?()
A. The track option monitors interfaces as defined by the user.
B. The track option monitors all interfaces participating in VRRP.
C. The track option allows for a reduction of the priority value if the monitored interface goes down.
D. The track option causes syslog entries to be written in the messages log file, if the monitored interface goes down.
[多项选择]Which two statements about Network Attached Storage are correct?()
A. Data is accessed using NFS or CIFS.
B. Data is accessed at the block level.
C. NAS is referred to as captive storage.
D. Storage devices can be shared between users.
E. A NAS implementation is not as fast as a DAS implementation.
[多项选择]Which two statements about static NAT translations are true?()
A. They are always present in the NAT table.
B. They allow connection to be initiated from the outside.
C. They can be configured with access lists, to allow two or more connections to be initiated from the outside.
D. They require no inside or outside interface markings because addresses are statically defined.
[多项选择]Which two statements about Cisco Security Management Suite are correct?()
A. It should be implemented in a management VLAN.
B. Its connection to managed devices should be over a data VLAN.
C. It is made up of Cisco Security MARS and Clean Access software.
D. It should be deployed as close to the edge of the network as possible.
E. It delivers policy administration and enforcement for the Cisco Self-Defending Network.
[多项选择]Which two statements about an interface configured with the asr-group command are correct?()
A. The FWSM supports up to 16 asymmetric routing groups.
B. If a matching packet is not found, the packet is dropped.
C. Asymetric routing of return traffic is enabled.
D. If a matching packet is found, the Layer 3 header is rewritten.
E. If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.
[多项选择]For which two reasons are Integrated Services Routers well-positioned for the SMB market?()
A. They are integrated with firewall capabilities.
B. They scan packets for malicious activity.
C. They offer superior site-to-site routing.
D. They require no configuration to install.
E. They offer the best choice for remote access needs.
[多项选择]Which two are components of the enhanced services software architecture?() (Choose two.)
A. Linux kernel
B. routing protocol daemon
C. session-based forwarding module
D. separate routing and security planes
[多项选择]Which two statements about workload capture and replay operations are true?()
A. The clients must be created manually on the test machines to perform more realistic testing.
B. Restart the database in RESTRICTED mode before beginning workload replay to enable a clean state for workload replay.
C. Restart the database in RESTRICTED mode before beginning workload capture to enable a clean state for capturing the workload.
D. The application state of the capture system must be identical to the application state of the replay system when the workload replay begins.
[多项选择]Which two statements about Junos software packet handling are correct?()(Choose two.)
A. The Junos OS applies service ALGs only for the first packet of a flow.
B. The Junos OS uses fast-path processing only for the first packet of a flow.
C. The Junos OS performs policy lookup only for the first packet of a flow.
D. The Junos OS applies SCREEN options for both first and consecutive packets of a flow.