Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
第1题:
Which two of these statements best describe the benefits of WPAv2? (Choose two.)()
第2题:
Which two statements accurately describe an IBGP peering session?() (Choose two.)
第3题:
Which two of these statements best describe the benefits of WPAv1? ()
第4题:
Which two of these statements best describe fast secure roaming? (Choose two.)()
第5题:
People may have different personalities.
People differ from each other in appearance.
People can learn to recognize human faces.
People can describe all human features of others.
第6题:
Full-duplex Ethernet uses CSMA/CD to prevent collisions.
Half-duplex Ethernet uses a loopback circuit to detect collisions.
A full-duplex Ethernet card allows 20Mbps for data transmission.
Full-duplex Ethernet makes use of two pairs of wires for data.
An Ethernet hub can operate both half and full duplex simultaneously.
第7题:
Broadcast domains require that the participating devices connect to common switches or hubs
Broadcast domains consist of devices reachable by frames addressed to the Layer 2 broadcast address
Broadcast domains require a gateway device such as a router
Broadcast domains consist of devices that reside on the same VLAN
第8题:
A role can be given to a maximum of 1000 users.
A user can have access to a maximum of 10 roles.
A role can have a maximum of 100 privileges contained in it.
Privileges are given to a role by using the CREATE ROLE statement.
A role is a named group of related privileges that can be granted to the user.
A user can have access to several roles, and several users can be assigned the same role.
第9题:
Which two statements complete a transaction? ()
第10题:
While deploying a new application module, the software vendor ships the application software along with appropriate SQL plan baselines for the new SQLs being introduced. Which two statements describe the consequences?()
第11题:
Which two statements describe the advantages to the use of RIP over the use of OSPF?()
第12题:
Which three statements describe how the strict SQL mode provides added security?()
第13题:
SSID broadcast prevention
Improved mutual authentication
Improved encryption through AES
Improved protection against sniffing initialization vectors
RF jamming prevention
第14题:
It enables traffic counting and logging.
It enforces a set of rules for transit traffic.
It controls host inbound services on a zone.
It controls administrator rights to access the device.
第15题:
It rejects statements that try to insert out-of-range values
It rejects invalid dates
It limits the operations that the server can perform
It rejects queries that produce out-of-range values
It rejects dates with zero day or month values