Which statements listed below describe the data dictionary views() 1) These are stored in the SYSTEM tablespace. 2) These are the based on the virtual tables. 3) These are owned by the SYS user. 4) These can be queried by a normal user only if O7_DICTIONARY_ACCESSIBILTY parameter is set to TRUE. 5) The V$FIXED_TABLE view can be queried to list the names of these views.
第1题:
A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
A.access-list 10 permit ip 192.168.147.0 0.0.0.255.255
B.access-list 10 permit ip 192.168.149.0 0.0.0.255.255
C.access-list 10 permit ip 192.168.146.0 0.0.0.0.255
D.access-list 10 permit ip 192.168.146.0 0.0.1.255
E.access-list 10 permit ip 192.168.148.0 0.0.1.255
F.access-list 10 permit ip 192.168.146.0 255.255.255.0
第2题:
A.access-list 10 permit 172.29.16.0 0.0.0.255
B.access-list 10 permit 172.29.16.0 0.0.1.255
C.access-list 10 permit 172.29.16.0 0.0.3.255
D.access-list 10 permit 172.29.16.0 0.0.15.255
E.access-list 10 permit 172.29.0.0 0.0.255.255
第3题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第4题:
Which of these appropriately describes the results of a manual SQL Tuning Advisor task?()
第5题:
Which of the following commands is used to retrieve database names from the local catalog for DRDA host databases on System i and System z?()
第6题:
Which of these appropriately describes the results of a manual SQL Tuning Advisor task?()
第7题:
The last policy is the default policy, which allows all traffic.
The order of policies is not important.
New policies are placed at the end of the policy list.
The insert command can be used to change the order.
第8题:
Individual statements in a named access list may be deleted.
They require a numbered range from 1000 to 1099.
When created, they must be specified as standard or extended.
They are created with the ip access-list command.
The entire access list must be deleted before editing.
They are applied with the ip name-group command.
第9题:
access-list 10 permit ip 192.168.147.0 0.0.0.255.255
access-list 10 permit ip 192.168.149.0 0.0.0.255.255
access-list 10 permit ip 192.168.146.0 0.0.0.0.255
access-list 10 permit ip 192.168.146.0 0.0.0.1.255
access-list 10 permit ip 192.168.148.0 0.0.0.1.255
access-list 10 permit ip 192.168.146.0 255.255.255.0
第10题:
A client group is a list of clients associated with a group.
A client group is a list of groups associated with a client.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第11题:
this login authenticationmethod list is automaticallyapplied to all lines except those that have a named method list explicitly defined
If the user fails the TACACS+ authentication then the local database on the router will be used to authenticatethe user
if the tacacs+ server fails to respond then the local database on the router will be used to authenticate the user
login is the name of the method list being configured
if the tacacs+ server is unavailable, authentication will succeed automaticallyby default
第12题:
A list of SQL statements and recommendations for tuning
A list of SQL statements that have been tuned by the Advisor,with before and after metrics
Graphs showing the actual performance improvement made by the Advisor after it implemented the recommended changes
All of the above
第13题:
An access list was written with the four statements shown in the graphic.Which single access list statement will combine all four of these statements into a single statement that will have exactly the same effect?()

A.access-list10 permit 172.29.16.00.0.0.255
B.access-list10 permit 172.29.16.00.0.1.255
C.access-list10 permit 172.29.16.00.0.3.255
D.access-list10 permit 172.29.16.00.0.15.255
E.access-list10 permit 172.29.0.00.0.255.255
第14题:
Which of the following are characteristics of named access lists?()
第15题:
A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()
第16题:
Which single access list statement will combine all four of these statements into a single statement that will have exactly the same effect()。
第17题:
Which of these statements concerning the collection interfaces are true?()
第18题:
POPULATE_LIST
POPULATE_GROUP
POPULATE_LIST_ITEM
POPULATE_LIST_FROM_GROUP
POPULATE_LIST_ITEM_FROM_GROUP
第19题:
access-list 15 deny telnet any 10.10.1.0 0.0.0.255 eq 23
access-list 115 deny udp any 10.10.1.0 eq telnet
access-list 15 deny tcp 10.10.1.0 255.255.255.0 eq telnet
access-list 115 deny tcp any 10.10.1.0 0.0.0.255 eq 23
access-list 15 deny udp any 10.10.1.0 255.255.255.0 eq 23
第20题:
A list of SQL statements and recommendations for tuning
A list of SQL statements that have been tuned by the Advisor, with before and after metrics
Graphs showing the actual performance improvement made by the Advisor after it implemented the recommended changes
All of the above
第21题:
Set extends Collection.
All methods defined in Set are also defined in Collection.
List extends Collection.
All methods defined in List are also defined in Collection.
Map extends Collection.
第22题:
access-list 10 permit 172.29.16.0 0.0.0.255
access-list 10 permit 172.29.16.0 0.0.1.255
access-list 10 permit 172.29.16.0 0.0.3.255
access-list 10 permit 172.29.16.0 0.0.15.255
access-list 10 permit 172.29.0.0 0.0.255.255
第23题:
A list of agencies or officials of Coastal State Administrators responsible for receiving and processing incident reports
A list of agencies or officials in regularly visited ports
A list specifying who will be responsible for informing the parties listed and the priority in which they must be notified
A list of personnel duty assignments
第24题:
You can delete individual statements in a named access list
Named access lists require a numbered range from 1000 to 1099.
Named access lists must be specified as standard or extended.
You can use the ip access-list command to create named access lists.
You cannot delete individual statements in a named access list.
You can use the ip name-group command to apply named access lists.