The table is accessible to all users.
Tables are created in the public schema.
Tables are created in your schema.
Tables are created in the DBA schema.
You must specify the schema when the table is created.
第1题:
You created an encrypted tablespace:You then closed the encryption wallet because you were advised that this is secure.Later in the day, you attempt to create the EMPLOYEES table in the SECURESPACE tablespace with the SALT option on the EMPLOYEE column.Which is true about the result?()
A. It creates the table successfully but does not encrypt any inserted data in the EMPNAME column because the wallet must be opened to encrypt columns with SALT.
B. It generates an error when creating the table because the wallet is closed.
C. It creates the table successfully, and encrypts any inserted data in the EMPNAME column because the wallet needs to be open only for tablespace creation.
D. It generates error when creating the table, because the salt option cannot be used with encrypted tablespaces.
第2题:
You are designing an application for a telecom company and you have been asked to design a database table to facilitate monthly bill generation. The bill would include details of customer calls, listed in chronological order. Which method would you follow to achieve this objective without increasing the overhead of sorting the rows?()
第3题:
A. An error is generated.
B. You will have two identical tables in the HR schema with different names.
C. You create a table called employees in the HR schema based on you EMP table.
D. You create an alternative name for the employees table in the HR schema in your own schema.
第4题:
In which scenario do you use the Flashback Database feature?()
第5题:
You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()
第6题:
You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.What should you do on the Junos Pulse Access Control Service to resolve this problem?()
A. Delete the default auth table mapping policy
B. Create auth table mapping policies that route users to specific resources
C. Create Resource Access policies that permit access to specific resources
D. Create Source Interface policies that route users to specific resources
第7题:
You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()
第8题:
A. The table is accessible to all users.
B. Tables are created in the public schema.
C. Tables are created in your schema.
D. Tables are created in the DBA schema.
E. You must specify the schema when the table is created.
第9题:
In which scenario will you perform a cancel-based recovery?()
第10题:
In which scenario will you use the Flashback Transaction Query feature?()