网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What are PAC files used for?()
A

 explicit forward mode proxy deployments

B

 L4TM

C

 transparent mode proxy deployments

D

 user agent-based policies


参考答案

参考解析
解析: 暂无解析
更多 “单选题What are PAC files used for?()A  explicit forward mode proxy deploymentsB  L4TMC  transparent mode proxy deploymentsD  user agent-based policies” 相关考题
考题 Which two statements are true about Oracle Managed Files (OMF)?() A. OMF cannot be used in a database that already has data files created with user-specified directions.B. The file system directions that are specified by OMF parameters are created automatically.C. OMF can be used with ASM disk groups, as well as with raw devices, for better file management.D. OMF automatically creates unique file names for table spaces and control files.E. OMF may affect the location of the redo log files and archived log files.

考题 You have set up an Internet based FTP server, where people can upload and download files. In terms of the OSI model, what is the highest layer used during the FTP sessions.A. ApplicationB. PresentationC. SessionD. TransportE. InternetF. Data LinkG. Physical

考题 Which protocol is used to transfer files to on the ERX Edge Router?() A.SCPB.FTPC.RCPD.TFTP

考题 A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?() A.EDITB.CHMODC.ATTRIBD.CONVERT

考题 Designing the data storage architecture is an important activity in system design. There are two main types of data storage formats: files and databases. Files are electronic of data that have been optimized to perform a particular transaction. There are several types of files that differ in the way they are used to support an application. ( ) store core information that is important to the business and , more specifically , to the application , such as order information or customer mailing information. (请作答此空) contain static values , such as a list of valid codes or the names of cities . Typically, the list is used for validation. A database is a collection of groupings of information that are related to each other in some way. There are many different types of databases that exist on the market today. ( ) is given to those databases which are based on older , sometimes outdated technology that is seldom used to develop new applications . ( ) are collections of records that are related to each other through pointers In relational database , ( ) can be used in ensuring that values linking the tables together through the primary and foreign keys are valid and correctly synchronized. A .Master files B .Look-up files C .Audit files D .History files

考题 What is Phantom RP used for?()A、it is used for load balancing in bidirectional PIMB、it is used for redundancy in bidirectional PIMC、it is used for redundancy in PIM-SMD、it is used for load balancing in PIM-SM

考题 What are PAC files used for?() A、 explicit forward mode proxy deploymentsB、 L4TMC、 transparent mode proxy deploymentsD、 user agent-based policies

考题 Which protocol is used to transfer files to on the ERX Edge Router?()A、SCPB、FTPC、RCPD、TFTP

考题 You have been assigned to manage a set of databases. The previous DBA did not leave you notes regarding the structure of each of the databases. While analyzing an instance, you notice that the system identifier (SID) for the instance is set to ’+ASM’. What is the purpose of this instance?()A、 This instance is being used to manage the operating system files.B、 This instance is being used to manage the files of other databases.C、 This instance is being used to manage the instances of other databases.D、 This instance is being used to manage the background processes of other instances.

考题 You have set up an Internet based FTP server, where people can upload and download files. In terms of the OSI model, what is the highest layer used during the FTP sessions.()A、ApplicationB、PresentationC、SessionD、TransportE、InternetF、DataLinkG、Physical

考题 A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()A、EDITB、CHMODC、ATTRIBD、CONVERT

考题 Which of the following commands would be used to verify the integrity of critical system files?()A、verifyB、nslookupC、sfcD、chkdsk

考题 Which of the following are contained in a store archive?()A、a JAR file containing commands and JSPsB、an XML file defining the content of the store archiveC、a ZIP file of Java properties files containing translated textD、a database backup file used to define store dataE、a number of ZIP files used to define store data

考题 Which of the following choices identifies a database component that will be used for multiplexing control files?()A、V$CONTROLFILE B、V$DATABASE C、init.ora D、DBA FILES

考题 You have a computer that runs Windows XP Professional. The computer has a limited amount of free disk space. You need to identify the amount of disk space that is used to store the following:Temporary Internet Files, Files in the Recycle Bin, Downloaded program files. What should you do?()A、From the command prompt, run chkdsk.exe.B、From the System Tools menu, run Disk Cleanup.C、From Internet Explorer, view the Internet Options.D、From System Properties, view the User Profiles settings.

考题 You work as an application developer at Certkiller .com. You are required to dynamically load assemblies into an application domain. You are using the Load method of the AppDomain class. What types of files can you this use method for?()A、 Library application files (.dll).B、 All assembly files, no matter what there file extensions are.C、 Application configuration files (.config).D、 Standalone application files (.exe).

考题 多选题Which of the following are contained in a store archive?()Aa JAR file containing commands and JSPsBan XML file defining the content of the store archiveCa ZIP file of Java properties files containing translated textDa database backup file used to define store dataEa number of ZIP files used to define store data

考题 单选题A system administrator needs to backup datavg which contains a database that pre-allocates files by padding them with nulls, similar to treating them as sparse files. In order to effectively backup and be able to restore the datavg files, which backup method should be used?()A savevgB tarC cpioD mksysb

考题 单选题You have set up an Internet based FTP server, where people can upload and download files. In terms of the OSI model, what is the highest layer used during the FTP sessions.()A ApplicationB PresentationC SessionD TransportE InternetF DataLinkG Physical

考题 多选题The RMAN BACKUP command using the DELETE INPUT option can be used with which three types of files? ()Adata filesBbackup setsCcontrol filesDarchived redo log files

考题 多选题Which two statements are true about Oracle Managed Files (OMF)?()AOMF cannot be used in a database that already has data files created with user-specified directions.BThe file system directions that are specified by OMF parameters are created automatically.COMF can be used with ASM disk groups, as well as with raw devices, for better file management.DOMF automatically creates unique file names for table spaces and control files.EOMF may affect the location of the redo log files and archived log files.

考题 单选题You have been assigned to manage a set of databases. The previous DBA did not leave you notes regarding the structure of each of the databases. While analyzing an instance, you notice that the system identifier (SID) for the instance is set to ’+ASM’. What is the purpose of this instance?()A  This instance is being used to manage the operating system files.B  This instance is being used to manage the files of other databases.C  This instance is being used to manage the instances of other databases.D  This instance is being used to manage the background processes of other instances.

考题 多选题You are managing an Oracle Database 11g database running in ARCHIVELOG mode. The FlashRecovery Area is specified as the destination for the archived redo log files. You notice this warning in thealert log file:  ORA-19815: WARNING:// db_recovery_file_dest_size of 3221225472 bytes is 100.00% used, and has 0remaining bytes available.  What would you do to reclaim the used space in the Flash Recovery Area()ABack up the Flash Recovery Area.BDecrease the retention time for the database backup and flashback log files.CManually delete all the archived log files from the Flash Recovery Area by using operating system (OS)commands.DManually delete all the expired backup sets from the Flash Recovery Area by using operating system(OS) commands.

考题 单选题You work as an application developer at Certkiller .com. You are required to dynamically load assemblies into an application domain. You are using the Load method of the AppDomain class. What types of files can you this use method for?()A  Library application files (.dll).B  All assembly files, no matter what there file extensions are.C  Application configuration files (.config).D  Standalone application files (.exe).

考题 单选题You are the administrator of the Windows XP Professional portable computers that are used by your company's sales representatives. The computers are members of a Windows 2000 domain. A Windows 2000 Server computer named Server1 contains the sales data used by the sales representatives in a shared folder named Data. When sales representatives travel, they use the Offline Files feature to access the files in the //Server1/Data shared folder. You want to ensure that the offline files on the portable computers are not accessible by unauthorized persons, in the event that a portable computer is lost. What should you do?()A Instruct the sales representatives to configure the permissions on the offline files on their portable computers to allow access for only their user accounts. B On Server1, configure the permissions on all files in the Data shared folder to allow access for only the sales representatives. C Use a Group Policy object (GPO) to enable the Encrypt the Offline Files cache option for the portable computers. D On the portable computers, enable encryption of the %systemroot%/CSC folder.E Apply this setting to the folder and files in the CSC folder.F On Server1, encrypt all files in the Data shared folder. 

考题 单选题Which of the following best describes a full backup? ()A All datafiles of a database B All datafiles, archive logs, and control files C All datafiles and control files D All the used blocks in a datafile

考题 单选题To enable the Database Smart Flash Cache, you configure the following parameters: DB_FLASH_CACHE_FILE = ‘/dev/flash_device_1’ , ‘/dev/flash_device_2’ DB_FLASH_CACHE_SIZE=64G What is the result when you start up the database instance?()A It results in an error because these parameter settings are invalid.B One 64G flash cache file will be used.C Two 64G flash cache files will be used.D Two 32G flash cache files will be used.