Which two statements are true about the hashCode method?()A、 The hashCode method for a given class can be used to test for object equality and object inequality for that class.B、 The hashCode method is used by the java.util.SortedSet collection class to o

题目

Which two statements are true about the hashCode method?()

  • A、 The hashCode method for a given class can be used to test for object equality and object inequality for that class.
  • B、 The hashCode method is used by the java.util.SortedSet collection class to order theelements within that set.
  • C、 The hashCode method for a given class can be used to test for object inequality, but NOT object equality, for that class.
  • D、 The only important characteristic of the values returned by a hashCode method is that the distribution of values must follow a Gaussian distribution.
  • E、 The hashCode method is used by the java.util.HashSet collection class to group the elements within that set into hash buckets for swift retrieval.

相似考题
更多“Which two statements”相关问题
  • 第1题:

    Which two statements are true with regard to policy ordering? ()(Choose two.)

    A. The last policy is the default policy, which allows all traffic.

    B. The order of policies is not important.

    C. New policies are placed at the end of the policy list.

    D. The insert command can be used to change the order.


    参考答案:C, D

  • 第2题:

    Which two statements are true about precedence values in policy?() (Choose two.)

    A. 1 is the default precedence.

    B. A lower number is preferred.

    C. A higher number is preferred.

    D. 100 is the default precedence.


    参考答案:B, D

  • 第3题:

    Which two statements are true about L2TP tunnels?() (Choose two.)

    • A、Traffic is clear text
    • B、Traffic is encrypted 
    • C、They are initiated by the LNS
    • D、They are initiated by the LAC

    正确答案:A,D

  • 第4题:

    Which two of these statements best describe the benefits of WPAv1? ()

    • A、 SSID broadcast prevention
    • B、 Improved mutual authentication
    • C、 Improved encryption through AES
    • D、 Improved protection against sniffing initialization vectors
    • E、 RF jamming prevention

    正确答案:B,D

  • 第5题:

    Which of the following statements are true?() 

    • A、 The equals() method determines if reference values refer to the same object.
    • B、 The == operator determines if the contents and type of two separate objects match.
    • C、 The equals() method returns true only when the contents of two objects match.
    • D、 The class File overrides equals() to return true if the contents and type of two separate objects        match.

    正确答案:A,D

  • 第6题:

    Which two statements are true regarding L2TP? ()(Choose two.)

    • A、Tunnels are initiated by the LAC
    • B、Tunnels are initiated by the LNS
    • C、By default, subscriber authentication occurs on the LNS
    • D、By default, subscriber authentication occurs on the LAC

    正确答案:A,C

  • 第7题:

    Which two statements are true regarding subqueries? ()

    • A、A subquery can retrieve zero or more rows 
    • B、Only two subqueries can be placed atone level 
    • C、A subquery can be used only in SQL query statements 
    • D、A subquery can appear on either side of a comparison operator 
    • E、There is no limit on the number of subquery levels in the WHERE clause of a SELECT statement 

    正确答案:A,D

  • 第8题:

    Which two statements are true regarding the USING and ON clauses in table joins?()

    • A、Both USING and ON clauses can be used for equijoins and nonequijoins 
    • B、Amaximum of one pair of columns can be joined between two tables using the ON clause 
    • C、The ON clause can be used to join tables on columns that have different names but compatible data types 
    • D、The WHERE clause can be used to apply additional conditions in SELECT statements containing the ON or the USING clause 

    正确答案:C,D

  • 第9题:

    多选题
    Which two statements are true about L2TP tunnels?() (Choose two.)
    A

    Traffic is clear text

    B

    Traffic is encrypted 

    C

    They are initiated by the LNS

    D

    They are initiated by the LAC


    正确答案: B,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements are true regarding the USING and ON clauses in table joins?()
    A

    Both USING and ON clauses can be used for equijoins and nonequijoins

    B

    Amaximum of one pair of columns can be joined between two tables using the ON clause

    C

    The ON clause can be used to join tables on columns that have different names but compatible data types

    D

    The WHERE clause can be used to apply additional conditions in SELECT statements containing the ON or the USING clause


    正确答案: A,D
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true about AH?() (Choose two.)
    A

    AH provides data integrity.

    B

    AH is identified by IP protocol 50.

    C

    AH is identified by IP protocol 51.

    D

    AH cannot work in conjunction with ESP


    正确答案: D,C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements are true about traffic shaping?()
    A

    Out-of-profile packets are queued.

    B

    It causes TCP retransmits.

    C

    Marking/remarking is not supported.

    D

    It does not respond to BECN and ForeSight Messages.

    E

    It uses a single/two-bucket mechanism for metering.


    正确答案: E,B
    解析: 暂无解析

  • 第13题:

    Which two statements regarding symmetric key encryption are true?() (Choose two.)

    A. The same key is used for encryption and decryption.

    B. It is commonly used to create digital certificate signatures.

    C. It uses two keys: one for encryption and a different key for decryption.

    D. An attacker can decrypt data if the attacker captures the key used for encryption.


    参考答案:A, D

  • 第14题:

    Which two statements are true regarding L2TP? ()(Choose two.)

    A. Tunnels are initiated by the LAC

    B. Tunnels are initiated by the LNS

    C. By default, subscriber authentication occurs on the LNS

    D. By default, subscriber authentication occurs on the LAC


    参考答案:A, C

  • 第15题:

    Which two statements accurately describe an IBGP peering session?() (Choose two.)

    • A、Peers are statically defined.
    • B、Peers exist within the same AS.
    • C、Peers must be directly connected to each other.
    • D、Peers advertise routes learned from other IBGP neighbors.

    正确答案:A,B

  • 第16题:

    Which two of these statements best describe fast secure roaming? (Choose two.)()  

    • A、 available only in autonomous APs
    • B、 available in autonomous and lightweight APs
    • C、 a feature of WDS in autonomous APs
    • D、 a feature of WDS in lightweight APs
    • E、 requires at least one AP and one Wireless LAN Services Module

    正确答案:B,C

  • 第17题:

    Which two statements are true regarding high-availability chassis clustering?()

    • A、A chassis cluster consists of two devices.
    • B、A chassis cluster consists of two or more devices.
    • C、Devices participating in a chassis cluster can be different models.
    • D、Devices participating in a chassis cluster must be the same models

    正确答案:A,D

  • 第18题:

    Which two statements are true about pool-based source NAT? ()(Choose two.)

    • A、PAT is not supported.
    • B、PAT is enabled by default.
    • C、It supports the address-persistent configuration option.
    • D、It supports the junos-global configuration option.

    正确答案:B,C

  • 第19题:

    Which two statements are true about standard database auditing()

    • A、DDL statements can be audited.
    • B、Statements that refer to stand-alone procedure can be audited.
    • C、Operations by the users logged on as SYSDBA cannot be audited.
    • D、Only one audit record is ever created for a session per audited statement even though it is executedmore than once.

    正确答案:A,B

  • 第20题:

    多选题
    Which two statements are true with regard to policy ordering? ()(Choose two.)
    A

    The last policy is the default policy, which allows all traffic.

    B

    The order of policies is not important.

    C

    New policies are placed at the end of the policy list.

    D

    The insert command can be used to change the order.


    正确答案: B,D
    解析: 暂无解析

  • 第21题:

    多选题
    Which two of these statements best describe the benefits of WPAv2? (Choose two.)()
    A

    SSID broadcast prevention

    B

    man-in-the-middle attack protection

    C

    cost reduction through software upgrades in all existing hardware

    D

    dynamic key generation

    E

    RF jamming prevention


    正确答案: D,C
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements are reserved words in Java?()
    A

    Run

    B

    Import

    C

    Default

    D

    Implement


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements are true regarding L2TP? ()(Choose two.)
    A

    Tunnels are initiated by the LAC

    B

    Tunnels are initiated by the LNS

    C

    By default, subscriber authentication occurs on the LNS

    D

    By default, subscriber authentication occurs on the LAC


    正确答案: C,D
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements are true regarding high-availability chassis clustering?()
    A

    A chassis cluster consists of two devices.

    B

    A chassis cluster consists of two or more devices.

    C

    Devices participating in a chassis cluster can be different models.

    D

    Devices participating in a chassis cluster must be the same models


    正确答案: C,B
    解析: 暂无解析