CMS专题

单选题Which describes the default behavior when you create a table? ()A The table is accessible to all users.B Tables are created in the public schema.C Tables are created in your schema.D Tables are created in the DBA schema.E You must specify the schema wh

题目
单选题
Which describes the default behavior when you create a table? ()
A

The table is accessible to all users.

B

Tables are created in the public schema.

C

Tables are created in your schema.

D

Tables are created in the DBA schema.

E

You must specify the schema when the table is created.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You created an encrypted tablespace:You then closed the encryption wallet because you were advised that this is secure.Later in the day, you attempt to create the EMPLOYEES table in the SECURESPACE tablespace with the SALT option on the EMPLOYEE column.Which is true about the result?()

A. It creates the table successfully but does not encrypt any inserted data in the EMPNAME column because the wallet must be opened to encrypt columns with SALT.

B. It generates an error when creating the table because the wallet is closed.

C. It creates the table successfully, and encrypts any inserted data in the EMPNAME column because the wallet needs to be open only for tablespace creation.

D. It generates error when creating the table, because the salt option cannot be used with encrypted tablespaces.


参考答案:C

第2题:

You are designing an application for a telecom company and you have been asked to design a database table to facilitate monthly bill generation. The bill would include details of customer calls, listed in chronological order.  Which method would you follow to achieve this objective without increasing the overhead of sorting the rows?()

  • A、create a hash cluster to store the data
  • B、create an index cluster to store the data
  • C、create a partitioned table to store the data
  • D、create a sorted hash cluster to store the data
  • E、create a heap table with rowid to store the data

正确答案:D

第3题:

Examine the statement: Create synonym emp for hr. employees; What happens when you issue the statement? ()

A. An error is generated.

B. You will have two identical tables in the HR schema with different names.

C. You create a table called employees in the HR schema based on you EMP table.

D. You create an alternative name for the employees table in the HR schema in your own schema.


参考答案:D

第4题:

In which scenario do you use the Flashback Database feature?()

  • A、 when a table is dropped and you restore it from the Recycle Bin
  • B、 when a user’s schema is dropped and you recover the user’s schema
  • C、 when some incorrect data is inserted in the table and you retrieve the table to a state that was at a certain timestamp
  • D、 when a row of a table is updated frequently and committed, and you view all the versions of the row within a specific duration

正确答案:B

第5题:

You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()

  • A、Dynamic auth table mapping is not enabled.
  • B、A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.
  • C、To create a static auth table mapping, you must delete the default policy.
  • D、The default policy applies only to the factory-default role User.

正确答案:A

第6题:

You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.What should you do on the Junos Pulse Access Control Service to resolve this problem?()

A. Delete the default auth table mapping policy

B. Create auth table mapping policies that route users to specific resources

C. Create Resource Access policies that permit access to specific resources

D. Create Source Interface policies that route users to specific resources


参考答案:A

第7题:

You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()

  • A、Delete the default auth table mapping policy
  • B、Create auth table mapping policies that route users to specific resources
  • C、Create Resource Access policies that permit access to specific resources
  • D、Create Source Interface policies that route users to specific resources

正确答案:A

第8题:

Which describes the default behavior when you create a table? ()

A. The table is accessible to all users.

B. Tables are created in the public schema.

C. Tables are created in your schema.

D. Tables are created in the DBA schema.

E. You must specify the schema when the table is created.


参考答案:C

第9题:

In which scenario will you perform a cancel-based recovery?()

  • A、 when a tablespace is dropped and you have only RMAN-based backup of the database
  • B、 when a table is dropped and stored in the Recycle Bin
  • C、 when you are required to recover an existing table to its previous state
  • D、 when a tablespace is dropped and you have only a user-managed full backup of the database

正确答案:D

第10题:

In which scenario will you use the Flashback Transaction Query feature?()

  • A、 when you want to restore an important table that is dropped from the Recycle Bin
  • B、 when you want to obtain the SQL statements to undo the deletion of some important records from a table by a transaction
  • C、when you want to restore a dropped user’s schema
  • D、 when a row of a table is updated many times within a specific time period and you want all the versions of the row in the specified time period

正确答案:B

更多相关问题