网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which file characteristic cannot be used in the Cisco IronPort Data Security policies?()
A
file type
B
file size
C
file age
D
file name
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which file characteristic cannot be used in the Cisco IronPort Data Security policies?()A file typeB file sizeC file ageD file name” 相关考题
考题
Which three statements are characteristic of the MEMORY storage engine?()
A.It can support transactionsB.Table contents are not saved if the server is restartedC.It cannot contain text or BLOB columnsD.It can support foreign keysE.Each table is represented on disk as an.frm fileF.Each table has a corresponding.MYI and .MYD file
考题
Which two statements are true about Oracle Managed Files (OMF)?()
A. OMF cannot be used in a database that already has data files created with user-specified directions.B. The file system directions that are specified by OMF parameters are created automatically.C. OMF can be used with ASM disk groups, as well as with raw devices, for better file management.D. OMF automatically creates unique file names for table spaces and control files.E. OMF may affect the location of the redo log files and archived log files.
考题
Which of the following is a characteristic of a schema?()
A.Foreign key references cannot cross schema boundaries.B.A DB2 user must be created before a schema with the same name can be created.C.If no schema is specified when an object is created, the default schema PUBLIC is used.D.A schema enables the creation of multiple objects in a database without encountering namespace collisions.
考题
Which of the following commands will display the name of the IOS image file being used in a Cisco router?()
A. Router# show IOSB. Router# show versionC. Router# show imageD. Router# show protocolsE. Router# show flash
考题
Which file characteristic cannot be used in the Cisco IronPort Data Security policies?() A、 file typeB、 file sizeC、 file ageD、 file name
考题
When creating a role in a Cisco Nexus 7000 Series Switch, rules are used to define the type of operations that a role will allow the user to perform. Which two of these parameters cannot be applied as a rule? () A、 port-profileB、 commandC、 access-listD、 feature-groupE、 OID
考题
Which of the following commands will display the name of the IOS image file being used in a Cisco router?()A、Router# show IOSB、Router# show versionC、Router# show imageD、Router# show protocolsE、Router# show flash
考题
You might recommend a Cisco Integrated Services Router to a business with which characteristic?()A、 a high-bandwidth environment with applications such as IP videoB、 a predominantly telecommuter workforceC、 a robust LAN intrusion detection systemD、 the intention to upgrade from Cisco Unified Communications Manager Express to Cisco Unified Communications Manager
考题
Which of the following commands changes a file characteristic so that it cannot be seen with astandard directory query? ()A、attrib file.txt +hB、attrib file.txt +rC、ren file.txtD、attrib file.txt +s
考题
Which of the following are contained in a store archive?()A、a JAR file containing commands and JSPsB、an XML file defining the content of the store archiveC、a ZIP file of Java properties files containing translated textD、a database backup file used to define store dataE、a number of ZIP files used to define store data
考题
Which of the following is a characteristic of a schema?()A、Foreign key references cannot cross schema boundaries.B、A DB2 user must be created before a schema with the same name can be created.C、If no schema is specified when an object is created, the default schema PUBLIC is used.D、A schema enables the creation of multiple objects in a database without encountering namespace collisions.
考题
The data file belonging to theSYSTEMtablespaceis corrupted and no backup of the file is available. How do you recover the data file?()A、The data file cannot be recovered.B、The date file can be restored from theSYSTEMauto backup.C、Take thetablespaceoffline,drop,kand re-create it.D、Recovery Manager (RMAN) is used to recover the data file.E、The ALTER DATABSE CREATE DATAFILE..commandis used to recover the data file.
考题
Which three statements are characteristic of the MEMORY storage engine?()A、It can support transactionsB、Table contents are not saved if the server is restartedC、It cannot contain text or BLOB columnsD、It can support foreign keysE、Each table is represented on disk as an.frm fileF、Each table has a corresponding.MYI and .MYD file
考题
单选题You might recommend a Cisco Integrated Services Router to a business with which characteristic?()A
a high-bandwidth environment with applications such as IP videoB
a predominantly telecommuter workforceC
a robust LAN intrusion detection systemD
the intention to upgrade from Cisco Unified Communications Manager Express to Cisco Unified Communications Manager
考题
多选题Which of the following are contained in a store archive?()Aa JAR file containing commands and JSPsBan XML file defining the content of the store archiveCa ZIP file of Java properties files containing translated textDa database backup file used to define store dataEa number of ZIP files used to define store data
考题
单选题Which of the following AIX commands is used to produce an input file that is then used to generate a NIS map file?()A
wdadmB
mrgpwdC
makedbmD
mkpasswd
考题
单选题Which one of the Cisco IOS commands can be used to verify that either the Cisco IOS image, theconfiguration files,or both have been properly backed up and secured?()A
show archiveB
show flashC
show file systemsD
show secure bootset
考题
多选题Which two statements are true about Oracle Managed Files (OMF)?()AOMF cannot be used in a database that already has data files created with user-specified directions.BThe file system directions that are specified by OMF parameters are created automatically.COMF can be used with ASM disk groups, as well as with raw devices, for better file management.DOMF automatically creates unique file names for table spaces and control files.EOMF may affect the location of the redo log files and archived log files.
考题
多选题Which three Server Pool Qualifications are used in the Cisco UCS manager?()AfirmwareBCPUCmemoryDadapter card
考题
多选题Which of the following commands will display the name of the IOS image file being used in a Cisco router?()ARouter# show IOSBRouter# show versionCRouter# show imageDRouter# show protocolsERouter# show flash
考题
单选题Which result is of securing the Cisco IOS image by use of the Cisco IOS image resilience feature?()A
The Cisco IOS image file will not be visible in the output from the show flash command.B
The show version command will not show the Cisco IOS image file location.C
When the router boots up, the Cisco IOS image will be loaded from a secured FTP location.D
The running Cisco IOS image will be encrypted and then automatically backed up to a TFTP server.
考题
单选题The data file belonging to the SYSTEM tablespace is corrupted and no backup of the file is available. How do you recover the data file?()A
The data file cannot be recovered.B
The date file can be restored from the SYSTEM auto backup.C
Take thetablespaceoffline,drop,kand re-create it.D
Recovery Manager (RMAN) is used to recover the data file.E
The ALTER DATABSE CREATE DATAFILE..commandis used to recover the data file.
考题
单选题Which characteristic of Halon is a disadvantage when it is used as a fire extinguishing medium?()A
Leaves a residueB
Cost,relative to other agentsC
Breaks down while under prolonged storageD
Conducts electricity
考题
多选题When creating a role in a Cisco Nexus 7000 Series Switch, rules are used to define the type of operations that a role will allow the user to perform. Which two of these parameters cannot be applied as a rule? ()Aport-profileBcommandCaccess-listDfeature-groupEOID
考题
多选题Which three statements are characteristic of the MEMORY storage engine?()AIt can support transactionsBTable contents are not saved if the server is restartedCIt cannot contain text or BLOB columnsDIt can support foreign keysEEach table is represented on disk as an.frm fileFEach table has a corresponding.MYI and .MYD file
考题
单选题Which of the following is a characteristic of a schema?()A
Foreign key references cannot cross schema boundaries.B
A DB2 user must be created before a schema with the same name can be created.C
If no schema is specified when an object is created, the default schema PUBLIC is used.D
A schema enables the creation of multiple objects in a database without encountering namespace collisions.
考题
单选题Which file characteristic cannot be used in the Cisco IronPort Data Security policies?()A
file typeB
file sizeC
file ageD
file name
考题
多选题Cisco IOS NetFlow gathers data that can be used in which three of these? ()AaccountingBauthenticationCauthorizationDnetwork monitoringEnetwork planning
热门标签
最新试卷