Constraint names must start with SYS_C
All constraints must be defines at the column level
Constraints can be created after the table is created
Constraints can be created at the same time the table is created
Information about constraints is found in the VIEW_CONSTRAINTS dictionary view
第1题:
Which two statements are true about traffic shaping?()
第2题:
Which two statements are true about pool-based source NAT? ()(Choose two.)
第3题:
You execute this command to drop the ITEM table, which has the primary key referred in the ORDERtable: SQL> DROP TABLE scott.item CASCADE CONSTRAINTS PURGE; Which two statements are true about the effect of the command()
第4题:
Which two statements are true about record groups?()
第5题:
Which two statements about creating constraints are true?()
第6题:
Which two statements are true about encrypting RMAN backup?() (Choose two.)
第7题:
Traffic is clear text
Traffic is encrypted
They are initiated by the LNS
They are initiated by the LAC
第8题:
Export polices can evaluate only active routes
Export polices can evaluate all routes
Export polices can be applied to the forwarding table
Export polices can be applied to interfaces
第9题:
AH provides data integrity.
AH is identified by IP protocol 50.
AH is identified by IP protocol 51.
AH cannot work in conjunction with ESP
第10题:
The bus is limited to 32 devices
It is a full duplex serial standard
It is a half-duplex serial standard
It allows up to 320 MB/s of shared channel bandwidth
第11题:
No flashback is possible to bring back the ITEM table.
The ORDER table is dropped along with the ITEM table.
The dependent referential integrity constraints in the ORDER table are disabled.
The dependent referential integrity constraints in the ORDER table are removed.
The table definition of the ITEM table and associated indexes are placed in the recycle bin.
第12题:
Constraint names must start with SYS_C
All constraints must be defines at the column level.
Constraints can be created after the table is created.
Constraints can be created at the same time the table is created.
Information about constraints is found in the VIEW_CONSTRAINTS dictionary view.
第13题:
Which two statements about the Cisco Nexus 1000V VSM are true?()
第14题:
Which two statements are true about precedence values in policy?() (Choose two.)
第15题:
Which two statements are true about encrypting RMAN backup?()
第16题:
Which two statements are true about constraints? ()
第17题:
Which two statements about creating constraints are true?()
第18题:
Inheritance represents an is-a relationship.
Inheritance represents a has-a relationship.
Interfaces must be used when creating a has-a relationship.
Instance variables can be used when creating a has-a relationship.
第19题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第20题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups
第21题:
Constraint names must start with SYS_C
All constraints must be defines at the column level
Constraints can be created after the table is created
Constraints can be created at the same time the table is created
Information about constraints is found in the VIEW_CONSTRAINTS dictionary view
第22题:
The UNIQUE constraint does not permit a null value for the column.
A UNIQUE index gets created for columns with PRIMARY KEY and UNIQUE constraints.
The PRIMARY KEY and FOREIGN KEY constraints create a UNIQUE index.
The NOT NULL constraint ensures that null values are not permitted for the column.
第23题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第24题:
Out-of-profile packets are queued.
It causes TCP retransmits.
Marking/remarking is not supported.
It does not respond to BECN and ForeSight Messages.
It uses a single/two-bucket mechanism for metering.