Which two statements are TRUE regarding Coherence Indexes ? 

题目
多选题
Which two statements are TRUE regarding Coherence Indexes ? ()
A

indexes are maintained by cache entry ownes

B

an application should not suggest an index that another aplication had suggested

C

indexes cannot be sorted

D

each application using Coherence may suggest the same set of indexes when it starts

参考答案和解析
正确答案: D,A
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

What two statements are true regarding the recommendations received from the SQL Access Advisor?()(Choose two.)

A. It cannot generate recommendations that support multiple workload queries.

B. It can recommend partitioning on tables provided that the workloads have some predicates and joins on the columns of the NUMBER or DATE type.

C. It can recommend partitioning only on tables that have at least 10,000 rows.

D. It can recommend only B-tree indexes and not bitmap or function-based indexes


参考答案:B, C

第2题:

Which two statements regarding symmetric key encryption are true?() (Choose two.)

A. The same key is used for encryption and decryption.

B. It is commonly used to create digital certificate signatures.

C. It uses two keys: one for encryption and a different key for decryption.

D. An attacker can decrypt data if the attacker captures the key used for encryption.


参考答案:A, D

第3题:

The RECYCLEBIN parameter is set to ON for your database. You drop a table, PRODUCTS, from the SCOTT schema.Which two statements are true regarding the outcome of this action?()

A. All the related indexes and views are automatically dropped

B. The flashback drop feature can recover only the table structure

C. Only the related indexes are dropped whereas views are invalidated

D. The flashback drop feature can recover both the table structure and its data


参考答案:C, D

第4题:

Which two statements are true regarding L2TP? ()(Choose two.)

  • A、Tunnels are initiated by the LAC
  • B、Tunnels are initiated by the LNS
  • C、By default, subscriber authentication occurs on the LNS
  • D、By default, subscriber authentication occurs on the LAC

正确答案:A,C

第5题:

Which two statements are true regarding the role of the Routing Engine (RE)?()

  • A、The RE controls and monitors the chassis.
  • B、The RE manages the Packet Forwarding Engine (PFE).
  • C、The RE receives a copy of the forwarding table from the forwarding plane.
  • D、The RE implements class of service (COS).

正确答案:A,B

第6题:

The RECYCLEBIN parameter is set to ON for your database. You drop a table, PRODUCTS, from the SCOTT schema.Which two statements are true regarding the outcome of this action? ()(Choose two)

A. All the related indexes and views are automatically dropped

B. The flashback drop feature can recover only the table structure

C. Only the related indexes are dropped whereas views are invalidated

D. The flashback drop feature can recover both the table structure and its data


参考答案:C, D

第7题:

Which two statements are true regarding L2TP? ()(Choose two.)

A. Tunnels are initiated by the LAC

B. Tunnels are initiated by the LNS

C. By default, subscriber authentication occurs on the LNS

D. By default, subscriber authentication occurs on the LAC


参考答案:A, C

第8题:

You issued the following command:An index is then created on the ADMIN_WORK_AREA temporary table. Which two statements are true regarding the TBS_T1 tablespace in the above command? ()

A. It stores only the temporary table but not its indexes.

B. It stores both the temporary table as well as its indexes.

C. It must be a nondefault temporary tablespace for the database.

D. It can be a default or nondefault temporary tablespace for the database.

E. It must be the default temporary tablespace of the user who issues the command.


参考答案:B, D

第9题:

Which two statements are true regarding high-availability chassis clustering?()

  • A、A chassis cluster consists of two devices.
  • B、A chassis cluster consists of two or more devices.
  • C、Devices participating in a chassis cluster can be different models.
  • D、Devices participating in a chassis cluster must be the same models

正确答案:A,D

第10题:

Which two statements regarding asymmetric key encryption are true?()

  • A、The same key is used for encryption and decryption.
  • B、It is commonly used to create digital certificate signatures.
  • C、It uses two keys: one for encryption and a different key for decryption.
  • D、An attacker can decrypt data if the attacker captures the key used for encryption

正确答案:A,B

更多相关问题