多选题Which three statements describe how the strict SQL mode provides added security?()AIt rejects statements that try to insert out-of-range valuesBIt rejects invalid datesCIt limits the operations that the server can performDIt rejects queries that produc

题目
多选题
Which three statements describe how the strict SQL mode provides added security?()
A

It rejects statements that try to insert out-of-range values

B

It rejects invalid dates

C

It limits the operations that the server can perform

D

It rejects queries that produce out-of-range values

E

It rejects dates with zero day or month values


相似考题
更多“多选题Which three statements describe how the strict SQL mode provides added security?()AIt rejects statements that try to insert out-of-range valuesBIt rejects invalid datesCIt limits the operations that the server can performDIt rejects queries that produc”相关问题
  • 第1题:

    Which two statements correctly describe VTP?()

    • A、Transparent mode always has a configuration revision number of 0.
    • B、Transparent mode cannot modify a VLAN database.
    • C、Client mode cannot forward received VTP advertisements.
    • D、Client mode synchronizes its VLAN database from VTP advertisements.
    • E、Server mode can synchronize across VTP domains.

    正确答案:A,D

  • 第2题:

    You are developing a Web page. The user types a credit card number into an input control named cc and clicks a button named submit. The submit button sends the credit card number to the server. A JavaScript library includes a CheckCreditCard function that returns a value of true if the credit card appears to be valid, based on its checksum. You need to ensure that the form cannot be used to submit invalid credit card numbers to the server. What should you do?()

    • A、Configure the input control to run on the server. On the submit button, add a server-side OnClick handler that calls CheckCreditCard  and  rejects  the form submission if the input is invalid.
    • B、On the input control,add an onChange handler that calls CheckCreditCard and cancels the form submission when the  input  is invalid.
    • C、Configure the input control and the submit button to run on the server. Add a submit_OnClick handler that calls CheckCreditCard  and  rejects  the  form  submission  if  the input is invalid.
    • D、On the form, add an onSubmit handler that calls CheckCreditCard and cancels the form submission if the input  is invalid.

    正确答案:D

  • 第3题:

    Which two statements regarding external authentication servers for firewall userauthentication are true?()

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed

    正确答案:B,D

  • 第4题:

    Which statements are true regarding the Query Result Cache?() 

    • A、 It can be set at the system, session, or table level.
    • B、 It is used only across statements in the same session.
    • C、 It can store the results from normal as well as flashback queries.
    • D、 It can store the results of queries based on normal,temporary,and dictionary tables.

    正确答案:A,C

  • 第5题:

    多选题
    Which three statements about performance analysis by SQL Performance Analyzer are true? ()(Choose three.)
    A

    It detects changes in SQL execution plans.

    B

    It produces results that can be used to create the SQL plan baseline.

    C

    The importance of SQL statements is based on the size of the objects accessed.

    D

    It generates recommendations to run SQL Tuning Advisor to tune regressed SQLs.

    E

    It shows only the overall impact on workload and not the net SQL impact on workload.


    正确答案: B,E
    解析: 暂无解析

  • 第6题:

    多选题
    You want to use the SQL Tuning Advisor to generate recommendations for badly written SQL statements in your development environment.   Which three sources can you select for the advisor to analyze? ()
    A

    Top SQL

    B

    snapshots

    C

    SQL Tuning sets

    D

    index access path

    E

    optimizer statistics

    F

    materialized view logs


    正确答案: A,B
    解析: 暂无解析

  • 第7题:

    多选题
    Which two statements are true regarding a PL/SQL package body?()
    A

    It cannot be created without a package specification.

    B

    It cannot invoke subprograms defined in other packages.

    C

    It can contain only the subprograms defined in the package specification.

    D

    It can be changed and recompiled without making the package specification invalid.


    正确答案: D,A
    解析: 暂无解析

  • 第8题:

    多选题
    Which two statements regarding external authentication servers for firewall userauthentication are true?()
    A

    Up to three external authentication server types can be used simultaneously.

    B

    Only one external authentication server type can be used simultaneously.

    C

    If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.

    D

    If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed


    正确答案: B,A
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements regarding a SQL profile are true?()
    A

    It is built by Automatic Tuning Optimizer.

    B

    It cannot be stored persistently in the data dictionary.

    C

    It can be used by the query optimizer automatically.

    D

    It can be created manually by using the CREATE PROFILE command.


    正确答案: C,B
    解析: 暂无解析

  • 第10题:

    多选题
    While deploying a new application module, the software vendor ships the application software along with appropriate SQL plan baselines for the new SQLs being introduced. Which two statements describe the consequences?()
    A

    The plan baselines can be evolved over time to produce better performance.

    B

    The newly generated plans are directly placed into the SQL plan baseline without being verified.

    C

    The new SQL statements initially run with the plans that are known to produce good performance under standard test configuration.

    D

    The optimizer does not generate new plans for the SQL statements for which the SQL plan baseline has been imported.


    正确答案: C,A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements correctly describe VTP?()
    A

    Transparent mode always has a configuration revision number of 0.

    B

    Transparent mode cannot modify a VLAN database.

    C

    Client mode cannot forward received VTP advertisements.

    D

    Client mode synchronizes its VLAN database from VTP advertisements.

    E

    Server mode can synchronize across VTP domains.


    正确答案: B,A
    解析: 暂无解析

  • 第12题:

    多选题
    Which three statements about performance analysis by SQL Performance Analyzer are true?()
    A

    It detects changes in SQL execution plans.

    B

    It produces results that can be used to create the SQL plan baseline.

    C

    The importance of SQL statements is based on the size of the objects accessed.

    D

    It generates recommendations to run SQL Tuning Advisor to tune regressed SQLs.

    E

    It shows only the overall impact on workload and not the net SQL impact on workload.


    正确答案: C,E
    解析: 暂无解析

  • 第13题:

    Which two statements describe the behavior of the server's SQL mode?()

    • A、The server's SQL mode determines how the server should behave when performing data validation check and interpreting different forms of syntax
    • B、The server's SQL mode determines whether the server should be read-only or should accept commands such as INSERT and UPDATE
    • C、The server's SQL mode can be changed at the session level with a SET SESSION sql_mode="new_value" command
    • D、The server's SQL mode, when globally set on a slave server, applies to events sent from the master

    正确答案:A,C

  • 第14题:

    Which three statements are valid SDM configuration wizards? ()

    • A、NAT
    • B、VPN
    • C、STP
    • D、Security Audit

    正确答案:A,B,D

  • 第15题:

    Which three statements describe how the strict SQL mode provides added security?()

    • A、It rejects statements that try to insert out-of-range values
    • B、It rejects invalid dates
    • C、It limits the operations that the server can perform
    • D、It rejects queries that produce out-of-range values
    • E、It rejects dates with zero day or month values

    正确答案:A,B,E

  • 第16题:

    A Windows Azure application stores data in a SQL Azure database.  The application will start an operation that includes three insert statements.  You need to recommend an approach for rolling back the entire operation if the connection to SQL Azure is lost.  What should you recommend?()

    • A、 Ensure that all statements execute in the same database transaction.
    • B、 Create a stored procedure in the database that wraps the insert statements in a TRY CATCH block.
    • C、 Create a stored procedure in the database that wraps the insertstatements in a TRANSACTION block.
    • D、 Open a new connection to the database. Use a separate transaction scope to roll back the original operation.

    正确答案:A

  • 第17题:

    单选题
    A Windows Azure application stores data in a SQL Azure database.  The application will start an operation that includes three insert statements.  You need to recommend an approach for rolling back the entire operation if the connection to SQL Azure is lost.  What should you recommend?()
    A

     Ensure that all statements execute in the same database transaction.

    B

     Create a stored procedure in the database that wraps the insert statements in a TRY CATCH block.

    C

     Create a stored procedure in the database that wraps the insertstatements in a TRANSACTION block.

    D

     Open a new connection to the database. Use a separate transaction scope to roll back the original operation.


    正确答案: B
    解析: 暂无解析

  • 第18题:

    多选题
    Which two statements are true about Oracle ActiveCache ?()
    A

    it supports very large data-sets such as the result-sets from large search queries to be held in memory

    B

    it provides a set of management tools that enables automation of configuration

    C

    it provides enhanced visibility across the entire application infrastructure

    D

    it significantly increases the performance of Web-based applications with no code change


    正确答案: C,D
    解析: 暂无解析

  • 第19题:

    多选题
    Which two statements describe the behavior of the server's SQL mode?()
    A

    The server's SQL mode determines how the server should behave when performing data validation check and interpreting different forms of syntax

    B

    The server's SQL mode determines whether the server should be read-only or should accept commands such as INSERT and UPDATE

    C

    The server's SQL mode can be changed at the session level with a SET SESSION sql_mode=new_value command

    D

    The server's SQL mode, when globally set on a slave server, applies to events sent from the master


    正确答案: D,A
    解析: 暂无解析

  • 第20题:

    单选题
    How does the man respond when the woman decides they should go on a diet?
    A

    He agrees at once.

    B

    He hesitates.

    C

    He rejects the idea immediately.


    正确答案: A
    解析: 从听力原文的开头部分,“Oh,no,not again.”可知男人一开始断然拒绝了节食减肥的建议,所以答案选C项。

  • 第21题:

    多选题
    Which two statements describe the purpose of a security policy?()
    A

    It enables traffic counting and logging.

    B

    It enforces a set of rules for transit traffic.

    C

    It controls host inbound services on a zone.

    D

    It controls administrator rights to access the device.


    正确答案: B,D
    解析: 暂无解析

  • 第22题:

    多选题
    Which three statements are characteristic of the MEMORY storage engine?()
    A

    It can support transactions

    B

    Table contents are not saved if the server is restarted

    C

    It cannot contain text or BLOB columns

    D

    It can support foreign keys

    E

    Each table is represented on disk as an.frm file

    F

    Each table has a corresponding.MYI and .MYD file


    正确答案: C,F
    解析: 暂无解析

  • 第23题:

    多选题
    Which statements are true regarding the Query Result Cache?()
    A

    It can be set at the system, session, or table level.

    B

    It is used only across statements in the same session.

    C

    It can store the results from normal as well as flashback queries.

    D

    It can store the results of queries based on normal,temporary,and dictionary tables.


    正确答案: A,C
    解析: 暂无解析

  • 第24题:

    多选题
    Which three statements describe how the strict SQL mode provides added security?()
    A

    It rejects statements that try to insert out-of-range values

    B

    It rejects invalid dates

    C

    It limits the operations that the server can perform

    D

    It rejects queries that produce out-of-range values

    E

    It rejects dates with zero day or month values


    正确答案: B,E
    解析: 暂无解析