The auto-increment lock can be a table-level lock
InnoDB never uses table-level locks
Some settings for innodb_autoinc_lock_mode can help reduce locking
InnoDB always protects auto-increment updates with a table-level lock
第1题:
By default, which two statements are true about export routing policies?()
第2题:
By default, which two statements are true about export routing polices?()
第3题:
Which two statements are true about InnoDB auto-increment locking?()
第4题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption
第5题:
Export polices can evaluate only active routes
Export polices can evaluate all routes
Export polices can be applied to the forwarding table
Export polices can be applied to interfaces
第6题:
Export policies can evaluate only active routes
Export policies can evaluate all routes
Export policies can be applied to the forwarding table
Export policies can be applied directly to interfaces
第7题:
A WHERE clause can be used to restrict both rows and groups.
A WHERE clause can be used to restrict rows only.
A HAVING clause can be used to restrict both rows and groups.
A HAVING clause can be used to restrict groups only.
A WHERE clause CANNOT be used in a query of the query uses a HAVING clause.
A HAVING clause CANNOT be used in subqueries.
第8题:
The ADR base keeps all diagnostic information in binary format
SQL*Plus provides the ADRI script, which can be used to work with ADR
The ADR can be used for problem diagnosis only when the database is open
The ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to null
The ADR can be used for problem diagnosis even when the database instance is down
The ADR base is shared across multiple instances
第9题:
The IDS is in the traffic path.
The IDS can send TCP resets to the source device.
The IDS can send TCP resets to the destination device.
The IDS listens promiscuously to all traffic on the network.
Default operation is for the IDS to discard malicious traffic.
第10题:
They accept only a single argument
They can be nested only to two levels
Arguments can only be column values or constants
They always return a single result row for every row of a queried table
They can return a data type value different from the one that is referenced
第11题:
Overflow pools do not support PAT
Overflow pools can not use the egress interface IP address for NAT
Overflow pools must use PAT
Overflow pools can contain the egress interface IP address or separate IP addresses
第12题:
Multiple action modifiers can be included in the same term.
Only a single action modifier can be included in the same term.
The default term within a firewall filter uses the discard action.
The default term within a firewall filter uses the reject action.
第13题:
Which two statements about the Cisco Nexus 1000V VSM are true?()
第14题:
What is true regarding InnoDB locking?()
第15题:
Which two statements are true regarding single row functions?()
第16题:
Export policies can evaluate only active routes.
Export policies can evaluate all routes.
Export policies can be applied to the forwarding table.
Export policies can be applied directly to interfaces
第17题:
The auto-increment lock can be a table-level lock
InnoDB never uses table-level locks
Some settings for innodb_autoinc_lock_mode can help reduce locking
InnoDB always protects auto-increment updates with a table-level lock
第18题:
InnoDB uses row and table-level locks, but row locks are not escalates
InnoDB locks only those rows that are updated
InnoDB only uses row locks, not page or table-level locks
InnoDB row locks may be escalated to page or table-level locks
InnoDB uses row-level or table-level locks depending on the number of rows affected
第19题:
Constraint names must start with SYS_C
All constraints must be defines at the column level
Constraints can be created after the table is created
Constraints can be created at the same time the table is created
Information about constraints is found in the VIEW_CONSTRAINTS dictionary view
第20题:
The ADR base keeps all diagnostic information in binary format
SQL*Plus provides the ADRI script, which can be used to work with ADR
The ADR can be used for problem diagnosis only when the database is open
The ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to null
The ADR can be used for problem diagnosis even when the database instance is down
The ADR base is shared across multiple instances
第21题:
The bigfile tablespace have only one data file.
The segment space management is automatic.
The extent management is dictionary managed.
The database can have only one bigfile tablespace.
The bigfile tablespace can be converted to a smallfile tablespace.
第22题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.
第23题:
It performs switching decisions and forwarding for the VEM
It can be run on a virtual machine
It can be used for remote VEM switching Iine cards
第24题:
They are always present in the NAT table.
They allow connection to be initiated from the outside.
They can be configured with access lists,to allow two or more connections to be initiated from the outside.
They require no inside or outside interface markings because addresses are statically defined.