单选题Which option ensures that data is not modified in transit?()AAuthorizationBConfidentialityCAuthenticationDIntegrity
单选题
Which option ensures that data is not modified in transit?()
A
Authorization
B
Confidentiality
C
Authentication
D
Integrity
参考解析
解析:
暂无解析
相关考题:
Which option provides a hierarchy of data security across lines of business?() A.AlertsB.Multi-OrgC.FlexfieldsD.Shared entitiesE.Business Intelligence
Which of the following is designed to guarantee that once data is written it cannot be modified?() A. FlashB. DLT4 tapesC. CD-RD. SDLT tapesE. WORM
Which component of VPN technology ensures that data can be read only by its intended recipient?() A. data integrityB. encryptionC. key exchangeD. authentication
Which option provides a hierarchy of data security across lines of business?()A、AlertsB、Multi-OrgC、FlexfieldsD、Shared entitiesE、Business Intelligence
Which statements are true about checkpointing()A、The checkpoint frequency decreases with the smaller redo log file size.B、It ensures that all committed data is written to the data files during normal shutdown.C、The frequent full checkpoint in a database can cause the overall degradation of the database performance.D、It prompts the Checkpoint (CKPT) process to write data to the data files and redo information to the onlineredo log files
Which two demonstrate encapsulation of data? ()A、 Member data have no access modifiers.B、 Member data can be modified directly.C、 The access modifier for methods is protected.D、 The access modifier to member data is private.E、 Methods provide for access and modification of data.
Which component of VPN technology ensures that data can be read only by its intended recipient?()A、data integrityB、encryptionC、key exchangeD、authentication
Which typical enterprise campus requirement ensures that the network supports the required applications and that data flows within the required time frames?()A、 availabilityB、 performanceC、 functionalityD、 manageability
Which of the following is designed to guarantee that once data is written it cannot be modified?()A、FlashB、DLT4 tapesC、CD-RD、SDLT tapesE、WORM
Which type of backup backs up only data blocks modified since the most recent backup at the same level or lower?() A、 Differential incremental backupB、 Different incremental backupC、 Cumulative backupD、 Cumulative incremental backup
You performed the RMAN database backup with the KEEP option.Which two statements are true about this backup?() (Choose two)A、The KEEP option overrides the configured retention policyB、The KEEP option is an attribute of an individual backup pieceC、The backup contains only data files and archived redo log filesD、The backup contains data files, the server parameter file and the control file even if the control file auto backup is disabled
Which two statements are true about checkpointing()A、The checkpoint frequency decreases with the smaller redo log file size.B、It ensures that all committed data is written to the data files during normal shutdown.C、The frequent full checkpoint in a database can cause the overall degradation of the database performance.D、It prompts the Checkpoint (CKPT) process to write data to the data files and redo information to the online redo log files.
The application tables owned by the user TEST in a test database need to be exported to the APPS schema in the production database by using Data Pump. Which option of Data Pump Import would you use to accomplish this?() A、 ownerB、 touserC、 attachD、 remap_schema
The loss of which two types of files may require a recovery with the RESETLOGS option?()A、 control filesB、 password fileC、 archived log filesD、 system-critical data files for which all the redo entries are presentE、 non-system-critical data files for which all the redo entries are present
单选题Which option provides a hierarchy of data security across lines of business?()AAlertsBMulti-OrgCFlexfieldsDShared entitiesEBusiness Intelligence
单选题Which type of backup backs up only data blocks modified since the most recent backup at the same level or lower?()ADifferential incremental backupBDifferent incremental backup CCumulative backup DCumulative incremental backup
多选题Which of the following is designed to guarantee that once data is written it cannot be modified?()AFlashBDLT4 tapesCCD-RDSDLT tapesEWORM
多选题You performed the RMAN database backup with the KEEP option.Which two statements are true about this backup?() (Choose two)AThe KEEP option overrides the configured retention policyBThe KEEP option is an attribute of an individual backup pieceCThe backup contains only data files and archived redo log filesDThe backup contains data files, the server parameter file and the control file even if the control file auto backup is disabled
单选题Which component of VPN technology ensures that data can be read only by its intended recipient?()Adata integrityBencryptionCkey exchangeDauthentication
多选题The loss of which two types of files may require a recovery with the RESETLOGS option?()Acontrol filesBpassword fileCarchived log filesDsystem-critical data files for which all the redo entries are presentEnon-system-critical data files for which all the redo entries are present
多选题Which two statements are true about checkpointing()AThe checkpoint frequency decreases with the smaller redo log file size.BIt ensures that all committed data is written to the data files during normal shutdown.CThe frequent full checkpoint in a database can cause the overall degradation of the database performance.DIt prompts the Checkpoint (CKPT) process to write data to the data files and redo information to the online redo log files.
单选题Which component of VPN technology ensures that data can be read only by its intended recipient?()AdataintegrityBencryptionCkeyexchangeDauthentication
多选题Which the two demonstrate encapsulation of data?()AMember data have no access modifiers.BMember data can be modified directly.CThe access modifier for methods is protected.DThe access modifier to member data is private.EMethods provide for access and modification of data.
多选题Your boss at Certkiller .com wants you to clarify Oracle 10g. Which two steps are performed the first time any UPDATE statement is issued after the instance is started?()ACreating the parse tree of the statementBWriting the modified data blocks to the data filesCWriting the modified data to the archived redo log filesDUpdating the control file to indicate the most recent checkpointEUpdating the data file header to indicate the most recent checkpointFReading the blocks to database buffer cache if they are not already there
单选题Which typical enterprise campus requirement ensures that the network supports the required applications and that data flows within the required time frames?()A availabilityB performanceC functionalityD manageability
单选题Which type of backup backs up only data blocks modified since the most recent backup at the same level or lower?()A Differential incremental backupB Different incremental backupC Cumulative backupD Cumulative incremental backup
单选题Two database users, Jack and Bill, are accessing the SupportCenter STAFF table of the SupportCenter DB database. When Jack modifies a value in the table, the new value is invisible to Bill. Which is the modified value invisible to Bill?()AThe modified data are not available on disk.BThe modified data have been flushed out from memory.CThe modified rows of the SupportCenter STAFF table have been locked.DJack has not committed the changes after modifying the value.EBoth users are accessing the database from two different machines.