Multiple transactions can use the same undo segment.
A transaction is assigned an undo segment when it is started.
More than one transaction cannot share the same extent in the undo tablespace.
The transactions use system undo segment to store undo data if all the segments in the undo tablespaceare used.
第1题:
Which two statements are true regarding high-availability chassis clustering?()
第2题:
Which two statements regarding asymmetric key encryption are true?()
第3题:
Which two statements are TRUE regarding Coherence Indexes ? ()
第4题:
Which two statements are true regarding transactions in an Oracle database()
第5题:
Multiple transactions can use the same undo segment.
A transaction is assigned an undo segment when it is started.
More than one transaction cannot share the same extent in the undo tablespace.
The transactions use system undo segment to store undo data if all the segments in the undo tablespaceare used.
第6题:
Both USING and ON clauses can be used for equijoins and nonequijoins
Amaximum of one pair of columns can be joined between two tables using the ON clause
The ON clause can be used to join tables on columns that have different names but compatible data types
The WHERE clause can be used to apply additional conditions in SELECT statements containing the ON or the USING clause
第7题:
IKE SA is bidirectional.
IPsec SA is bidirectional.
IKE SA is established during phase 2 negotiations.
IPsec SA is established during phase 2 negotiations.
第8题:
It requires relinking of the Oracle binary.
It does not require database instance shutdown.
It can detect conflicts between two online patches.
It is available for installing all patches on all platforms.
It works only in a single database instance environment.
第9题:
Tunnels are initiated by the LAC
Tunnels are initiated by the LNS
By default, subscriber authentication occurs on the LNS
By default, subscriber authentication occurs on the LAC
第10题:
A client group is a list of clients associated with a group.
A client group is a list of groups associated with a client.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第11题:
They accept only a single argument
They can be nested only to two levels
Arguments can only be column values or constants
They always return a single result row for every row of a queried table
They can return a data type value different from the one that is referenced
第12题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.
第13题:
Which two statements are true regarding L2TP? ()(Choose two.)
第14题:
Which two statements are true regarding undo tablespaces()
第15题:
Which two statements are true regarding subqueries? ()
第16题:
Which two statements are true regarding the USING and ON clauses in table joins?()
第17题:
You can find information about only active transactions from the view
You can find information about read only transactions from the view
You require the SELECT ANY TRANSACTION system privilege to access the view
You can find information about both active and committed transactions from the view
You require the SELECT ON FLASHBACK_TRANSACTION_QUERY object privilege to access the view
第18题:
It is executed first in the query execution
It must be the last clause in the SELECT statement
It cannot be used in a SELECT statement containing a HAVING clause
You cannot specify a column name followed by an expression in this clause
You can specify a combination of numeric positions and column names in this clause
第19题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption
第20题:
indexes are maintained by cache entry ownes
an application should not suggest an index that another aplication had suggested
indexes cannot be sorted
each application using Coherence may suggest the same set of indexes when it starts
第21题:
The database can have more than one undo tablespace.
The UNDO_TABLESPACE parameter is valid in both automatic andmanualundo management.
Undo segments automatically grow and shrink as needed, acting as circular storage buffer for their assigned transactions.
An undotablespaceis automatically created if the UNDO_TABLESPACEparameter is not set and the UNDO_MANAGEMENT parameter is set to AUTO during the database instance start up.
第22题:
The RE controls and monitors the chassis.
The RE manages the Packet Forwarding Engine (PFE).
The RE receives a copy of the forwarding table from the forwarding plane.
The RE implements class of service (COS).
第23题:
It is built by Automatic Tuning Optimizer.
It cannot be stored persistently in the data dictionary.
It can be used by the query optimizer automatically.
It can be created manually by using the CREATE PROFILE command.
第24题:
A chassis cluster consists of two devices.
A chassis cluster consists of two or more devices.
Devices participating in a chassis cluster can be different models.
Devices participating in a chassis cluster must be the same models