1Z0-053

多选题What two statements are true regarding the recommendations received from the SQL Access Advisor?()(Choose two.)AIt cannot generate recommendations that support multiple workload queries.BIt can recommend partitioning on tables provided that the workloa

题目
多选题
What two statements are true regarding the recommendations received from the SQL Access Advisor?()(Choose two.)
A

It cannot generate recommendations that support multiple workload queries.

B

It can recommend partitioning on tables provided that the workloads have some predicates and joins on the columns of the NUMBER or DATE type.

C

It can recommend partitioning only on tables that have at least 10,000 rows.

D

It can recommend only B-tree indexes and not bitmap or function-based indexes

参考答案和解析
正确答案: C,A
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

ICMP is often used in troubleshooting and verifying network. What statements are true regarding ICMP packets? (Choose two)

A. They acknowledge receipt of TCP segments.

B. They guarantee datagram delivery.

C. They can provide hosts with information about network problems.

D. They are encapsulated within IP datagrams.

E. They are encapsulated within UDP datagrams.

F. They are encapsulated within TCP datagrams.


正确答案:CD
C,D 解析:Explanation:
ping may be used to find out whether the local machines are connected to the network or whether a remote site is reachable. This tool is a common network tool for determining the network connectivity which uses ICMP protocol instead of TCP/IP and UDP/IP. This protocol is usually associated with the network management tools which provide network information to network administrators, such as ping and traceroute (the later also uses the UDP/IP protocol).

ICMP is quite different from the TCP/IP and UDP/IP protocols. No source and destination ports are included in its packets. Therefore, usual packet-filtering rules for TCP/IP and UDP/IP are not applicable. Fortunately, a special "signature" known as the packet's Message type is included for denoting the purposes of the ICMP packet. Most commonly used message types are namely, 0, 3, 4, 5, 8, 11, and 12 which represent echo reply, destination unreachable, source quench, redirect, echo request, time exceeded, and parameter problem respectively.

Incorrect Answers
ICMP is an IP protocol so A and E are incorrect.
ICMP doesn't guarantee datagram delivery so B is wrong as well.

第2题:

Which two statements are true regarding L2TP? ()(Choose two.)

A. Tunnels are initiated by the LAC

B. Tunnels are initiated by the LNS

C. By default, subscriber authentication occurs on the LNS

D. By default, subscriber authentication occurs on the LAC


参考答案:A, C

第3题:

What two statements are true regarding the recommendations received from the SQL Access Advisor?()(Choose two.)

A. It cannot generate recommendations that support multiple workload queries.

B. It can recommend partitioning on tables provided that the workloads have some predicates and joins on the columns of the NUMBER or DATE type.

C. It can recommend partitioning only on tables that have at least 10,000 rows.

D. It can recommend only B-tree indexes and not bitmap or function-based indexes


参考答案:B, C

第4题:

Which two statements regarding asymmetric key encryption are true?()

  • A、The same key is used for encryption and decryption.
  • B、It is commonly used to create digital certificate signatures.
  • C、It uses two keys: one for encryption and a different key for decryption.
  • D、An attacker can decrypt data if the attacker captures the key used for encryption

正确答案:A,B

第5题:

Which two statements are true regarding high-availability chassis clustering?()

  • A、A chassis cluster consists of two devices.
  • B、A chassis cluster consists of two or more devices.
  • C、Devices participating in a chassis cluster can be different models.
  • D、Devices participating in a chassis cluster must be the same models

正确答案:A,D

第6题:

Which two statements regarding symmetric key encryption are true?() (Choose two.)

A. The same key is used for encryption and decryption.

B. It is commonly used to create digital certificate signatures.

C. It uses two keys: one for encryption and a different key for decryption.

D. An attacker can decrypt data if the attacker captures the key used for encryption.


参考答案:A, D

第7题:

What statements are true regarding ICMP packets?()

  • A、They acknowledge receipt of TCP segments.
  • B、They guarantee datagram delivery.
  • C、They can provide hosts with information about network problems.
  • D、They are encapsulated within IP datagrams.
  • E、They are encapsulated within UDP datagrams.

正确答案:C,D

第8题:

Evaluate these two SQL statements:What is true about them?()

A. The two statements produce identical results.

B. The second statement returns a syntax error.

C. There is no need to specify DESC because the results are sorted in descending order by default.

D. The two statements can be made to produce identical results by adding a column alias for the salary column in the second SQL statement.


参考答案:A

第9题:

Which two statements are true regarding L2TP? ()(Choose two.)

  • A、Tunnels are initiated by the LAC
  • B、Tunnels are initiated by the LNS
  • C、By default, subscriber authentication occurs on the LNS
  • D、By default, subscriber authentication occurs on the LAC

正确答案:A,C

第10题:

Whitch two statements are true regarding the role of the Routing Engine (RE)? ()

  • A、The RE controls and monitors the chassis
  • B、The RE manages the Packet Forwarding Engine (PFE)
  • C、The RE receives a copy of the forwarding table from the forwarding plane
  • D、The RE implements class of service (COS)

正确答案:A,B

更多相关问题