网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two statements are true regarding Health Monitor checks in Oracle Database 11g?()
A

Health Monitor checks can be used to scan the contents of the redo log and archive logs for accessibility and corruption.

B

Health Monitor checks can be used to verify the integrity of database files and report failures if these files are inaccessible,corrupt or inconsistent.

C

Health Monitor checks can be used to verify the contents of dictionary entries for each dictionary object and fix it automatically.

D

Health Monitor checks are always initiated manually when there is some critical error.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two statements are true regarding Health Monitor checks in Oracle Database 11g?()AHealth Monitor checks can be used to scan the contents of the redo log and archive logs for accessibility and corruption.BHealth Monitor checks can be used to verify the integrity of database files and report failures if these files are inaccessible,corrupt or inconsistent.CHealth Monitor checks can be used to verify the contents of dictionary entries for each dictionary object and fix it automatically.DHealth Monitor checks are always initiated manually when there is some critical error.” 相关考题
考题 Examine the section of the Health Check report given below:Which two statements are true regarding the Health Check report?() A. Health Check was performed manually.B. Health Check was performed to check the disk image block corruptions.C. Health Check was performed to check interblock and intersegment corruption.D. Health Check was performed to verify the integrity of database files and report failures.E. Health Check was performed by the Health Monitor automatically in response to a critical error.

考题 Which two statements regarding symmetric key encryption are true?() (Choose two.) A. The same key is used for encryption and decryption.B. It is commonly used to create digital certificate signatures.C. It uses two keys: one for encryption and a different key for decryption.D. An attacker can decrypt data if the attacker captures the key used for encryption.

考题 Which two statements are true regarding L2TP? ()(Choose two.) A. Tunnels are initiated by the LACB. Tunnels are initiated by the LNSC. By default, subscriber authentication occurs on the LNSD. By default, subscriber authentication occurs on the LAC

考题 Which two statements regarding firewall user authentication client groups are true?() (Choose two.)A、A client group is a list of clients associated with a group.B、A client group is a list of groups associated with a client.C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

考题 Which two statements are true regarding the role of the Routing Engine (RE)?()A、The RE controls and monitors the chassis.B、The RE manages the Packet Forwarding Engine (PFE).C、The RE receives a copy of the forwarding table from the forwarding plane.D、The RE implements class of service (COS).

考题 Which two statements are true regarding high-availability chassis clustering?()A、A chassis cluster consists of two devices.B、A chassis cluster consists of two or more devices.C、Devices participating in a chassis cluster can be different models.D、Devices participating in a chassis cluster must be the same models

考题 Which two statements are true regarding L2TP? ()(Choose two.)A、Tunnels are initiated by the LACB、Tunnels are initiated by the LNSC、By default, subscriber authentication occurs on the LNSD、By default, subscriber authentication occurs on the LAC

考题 Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption

考题 Which two statements are true regarding the SQL Repair Advisor?() A、 The SQL Repair Advisor can be invoked to tune the performance of the regressed SQL statements.B、 The SQL Repair Advisor can be invoked even when the incident is not active for a SQL statement crash.C、 The SQL Repair Advisor is invoked by the Health Monitor when it encounters the problematic SQL statement.D、 The DBA can invoke the SQL Repair Advisor when he or she receives an alert generated when a SQL statement crashes and an incident is created in the ADR.

考题 Which two statements are TRUE regarding Coherence Indexes ? ()A、 indexes are maintained by cache entry ownesB、 an application should not suggest an index that another aplication had suggestedC、 indexes cannot be sortedD、 each application using Coherence may suggest the same set of indexes when it starts

考题 Which two statements are true regarding subqueries? ()A、A subquery can retrieve zero or more rows B、Only two subqueries can be placed atone level C、A subquery can be used only in SQL query statements D、A subquery can appear on either side of a comparison operator E、There is no limit on the number of subquery levels in the WHERE clause of a SELECT statement 

考题 Which two statements are true regarding the USING and ON clauses in table joins?()A、Both USING and ON clauses can be used for equijoins and nonequijoins B、Amaximum of one pair of columns can be joined between two tables using the ON clause C、The ON clause can be used to join tables on columns that have different names but compatible data types D、The WHERE clause can be used to apply additional conditions in SELECT statements containing the ON or the USING clause 

考题 Examine the section of the Health Check report given below:   DBMS_HM.GET_RUN_REPORT(’HM_RUN_1061’)  Run Name : HM_RUN_1061 Run Id : 1061 Check Name : Data Block Integrity Check Mode : REACTIVE Status : COMPLETED Start Time : 2007-05-12 22:11:02.032292 -07:00 End  Time :  2007-05-12 22:11:20.835135 -07:00 Error Encountered : 0 Source Incident Id : 7418 Number of Incidents Created :0   Which two statements are true regarding the Health Check report?()A、 Health Check was performed manually.B、 Health Check was performed to check the disk image block corruptions.C、 Health Check was performed to check interblock and intersegment corruption.D、 Health Check was performed to verify the integrity of database files and report failures.E、 Health Check was performed by the Health Monitor automatically in response to a critical error.

考题 Which two statements are true regarding Health Monitor checks in Oracle Database 11g?()  A、 Health Monitor checks can be used to scan the contents of the redo log and archive logs for accessibility and corruption.B、 Health Monitor checks can be used to verify the integrity of database files and report failures if these files are inaccessible,corrupt or inconsistent.C、 Health Monitor checks can be used to verify the contents of dictionary entries for each dictionary object and fix it automatically.D、 Health Monitor checks are always initiated manually when there is some critical error.

考题 多选题Which two statements are true regarding the USING and ON clauses in table joins?()ABoth USING and ON clauses can be used for equijoins and nonequijoinsBAmaximum of one pair of columns can be joined between two tables using the ON clauseCThe ON clause can be used to join tables on columns that have different names but compatible data typesDThe WHERE clause can be used to apply additional conditions in SELECT statements containing the ON or the USING clause

考题 多选题Regarding an IPsec security association (SA), which two statements are true?()AIKE SA is bidirectional.BIPsec SA is bidirectional.CIKE SA is established during phase 2 negotiations.DIPsec SA is established during phase 2 negotiations.

考题 多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption

考题 多选题Which two statements are true regarding hot patching?()AIt requires relinking of the Oracle binary.BIt does not require database instance shutdown.CIt can detect conflicts between two online patches.DIt is available for installing all patches on all platforms.EIt works only in a single database instance environment.

考题 多选题Which two statements are TRUE regarding Coherence Indexes ? ()Aindexes are maintained by cache entry ownesBan application should not suggest an index that another aplication had suggestedCindexes cannot be sortedDeach application using Coherence may suggest the same set of indexes when it starts

考题 多选题Which two statements are true regarding L2TP? ()(Choose two.)ATunnels are initiated by the LACBTunnels are initiated by the LNSCBy default, subscriber authentication occurs on the LNSDBy default, subscriber authentication occurs on the LAC

考题 多选题Which two statements are true regarding the SQL Repair Advisor?()AThe SQL Repair Advisor can be invoked to tune the performance of the regressed SQL statements.BThe SQL Repair Advisor can be invoked even when the incident is not active for a SQL statement crash.CThe SQL Repair Advisor is invoked by the Health Monitor when it encounters the problematic SQL statement.DThe DBA can invoke the SQL Repair Advisor when he or she receives an alert generated when a SQL statement crashes and an incident is created in the ADR.

考题 多选题Which two statements are true regarding the role of the Routing Engine (RE)?()AThe RE controls and monitors the chassis.BThe RE manages the Packet Forwarding Engine (PFE).CThe RE receives a copy of the forwarding table from the forwarding plane.DThe RE implements class of service (COS).

考题 多选题Which two statements are true regarding single row functions?()AThey accept only a single argumentBThey can be nested only to two levelsCArguments can only be column values or constantsDThey always return a single result row for every row of a queried tableEThey can return a data type value different from the one that is referenced

考题 多选题Which two statements regarding a SQL profile are true?()AIt is built by Automatic Tuning Optimizer.BIt cannot be stored persistently in the data dictionary.CIt can be used by the query optimizer automatically.DIt can be created manually by using the CREATE PROFILE command.

考题 多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.

考题 多选题Which two statements are true regarding high-availability chassis clustering?()AA chassis cluster consists of two devices.BA chassis cluster consists of two or more devices.CDevices participating in a chassis cluster can be different models.DDevices participating in a chassis cluster must be the same models

考题 多选题Examine the section of the Health Check report given below:   DBMS_HM.GET_RUN_REPORT(’HM_RUN_1061’)  Run Name : HM_RUN_1061 Run Id : 1061 Check Name : Data Block Integrity Check Mode : REACTIVE Status : COMPLETED Start Time : 2007-05-12 22:11:02.032292 -07:00 End  Time :  2007-05-12 22:11:20.835135 -07:00 Error Encountered : 0 Source Incident Id : 7418 Number of Incidents Created :0   Which two statements are true regarding the Health Check report?()AHealth Check was performed manually.BHealth Check was performed to check the disk image block corruptions.CHealth Check was performed to check interblock and intersegment corruption.DHealth Check was performed to verify the integrity of database files and report failures.EHealth Check was performed by the Health Monitor automatically in response to a critical error.