Which statement is true about a worm attack?()
第1题:
Which statement is true about TCN propagation?()
第2题:
A WORM drive can be equated to which of the following common technologies?()
第3题:
Which of the following is a sign that a computer has been infected by a worm?()
第4题:
A batch application executes a large number of update statements. The service level agreement for the application states that the application must complete its work as quickly as possible to ensure that dependent workloads can start ontime. What is one way to help the application complete quickly?()
第5题:
Which statement is true about the Manageability Monitor (MMON) background proces()
第6题:
Evaluate the SQL statement:TRUNCATE TABLE DEPT;Which three are true about the SQL statement? ()
第7题:
Which two statements are true about setting the per-thread buffers higher than required?()
第8题:
Which statement is true about "sticky" load balancing for Clusters? ()
第9题:
The declaration on line 2 does not allocate memory space for the variable myVect.
The declaration on line 2 allocates memory space for a reference to a Vector object.
The statement on line 2 creates an object of class Vector.
The statement on line 3 creates an object of class Vector.
The statement on line 3 allocates memory space for an object of class Vector.
第10题:
Inoculate systems by applying update patches.
Limit traffic rate.
Apply authentication.
Quarantine infected machines.
Enable anti-spoof measures.
第11题:
It sends ping requests in segments of an invalid size
It intercepts the third step in a TCP three-way handshake to hijack a session
It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem
It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack
第12题:
Allocates memory for RMAN backup and restore operations
Allocates memory for shared and private SQL areas
Contains a cursor area for storing runtime information about cursors
Contains stack space
Contains a hash area performing hash joins of tables
第13题:
What are two steps that must be taken when mitigating a worm attack?()
第14题:
Which statement is true about a Smurf attack?()
第15题:
Which of the following does an out-of-memory error indicate on a printer?()
第16题:
Given the following code fragment: public void create() { Vector myVect; myVect = new Vector(); } Which of the following statements are true?()
第17题:
Which two statements are true about Oracle ActiveCache ?()
第18题:
Which three are true about the large pool for an Oracle database instance that supports shared serverconnections?()
第19题:
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()
第20题:
In India, the infection rate almost reaches 12 percent of its population.
In China, about 50,000 people are infected with HIV.
AIDS epidemic had caused 15,000,000 deaths in the whole world by January 2,000.
In the United States, HIV infection will go on to attack about 5% of the whole population.
第21题:
More memory per thread is beneficial in all scenarios
It causes increased overhead due to initial memory allocation
It can affect system stability during peak load times, due to swapping
It requires increasing the thread_cache_size variable
第22题:
Human interaction is required to facilitate the spread.
The worm executes arbitrary code and installs copies of itself in the memory of the infected computer.
Extremely large volumes of requests are sent over a network or over the Internet.
Data or commands are injected into an existing stream of data. That stream is passed between a client and server application.
第23题:
It can reach no further than human voice.
It can reach a large audience.
It is rapid and efficient.
It can be trusted.