多选题Which three statements correctly describe the functions and use of constraints? ()AConstraints provide data independence.BConstraints make complex queries easy.CConstraints enforce rules at the view level.DConstraints enforce rules at the table level.EConstraints prevent the deletion of a table if there are dependencies.FConstraints prevent the deletion of an index if there are dependencies.
多选题
Which three statements correctly describe the functions and use of constraints? ()
A
Constraints provide data independence.
B
Constraints make complex queries easy.
C
Constraints enforce rules at the view level.
D
Constraints enforce rules at the table level.
E
Constraints prevent the deletion of a table if there are dependencies.
F
Constraints prevent the deletion of an index if there are dependencies.
参考解析
解析:
暂无解析
相关考题:
Which of the following correctly describe the various functions and virtues of a router? (Select all valid answer choices)A. Packet switchingB. Collision prevention on a LAN segment.C. Packet filteringD. Broadcast domain enlargementE. Broadcast forwardingF. Internetwork communicationG. None of the above
An ATM PVC is configured as atm pvc 1 0 101 aal5snap 256 128 100 .Which three statements describe the traffic management characteristics of this interface?() A.AB.BC.CD.DE.E
Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.) A. includes three design levelsB. incorporates products and technologies into enterprise, service provider, and commercial systemsC. extends the value of designs through a sustained development planD. does not factor customer input design processE. facilitates faster and more reliable customer deploymentsF. incorporates a narrow range of technologies and products
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?() A. Troubleshooting is more complicated.B. Service and switch modules are underutilized.C. Layer 2 adjacency is required with the servers that use this design.D. Layer 3 adjacency is required with the servers that use this design.E. Load balancing will always occur across both access layer uplinks.
Refer to the exhibit. Which three statements correctly describe Network Device A?() A.With a network wide mask of 255.255.255.128, each interface does not require an IP address.B.With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.C.With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.D.With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.E.With a network wide mask of 255.255.254.0, each interface does not require an IP address.
Which two statements correctly describe VTP?()A、Transparent mode always has a configuration revision number of 0.B、Transparent mode cannot modify a VLAN database.C、Client mode cannot forward received VTP advertisements.D、Client mode synchronizes its VLAN database from VTP advertisements.E、Server mode can synchronize across VTP domains.
Which three statements correctly describe the features of the I/O calibration process?()A、Only one I/O calibration process can run at a time.B、It automates the resource allocation for the Automated Maintenance Tasks.C、It improves the performance of the performance-critical sessions while running.D、It can be used to estimate the maximum number of I/Os and maximum latency time for the system.E、The latency time is computed only when the TIMED_STATISTICS initialization parameter is set to TRUE.
Which of the following correctly describe the various functions and virtues of a router?()A、Packet switchingB、Collision prevention on a LAN segment.C、Packet filteringD、Broadcast domain enlargementE、Broadcast forwardingF、Internetwork communication
Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)A、includes three design levelsB、incorporates products and technologies into enterprise, service provider, and commercial systemsC、extends the value of designs through a sustained development planD、does not factor customer input design processE、facilitates faster and more reliable customer deploymentsF、incorporates a narrow range of technologies and products
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()A、Troubleshooting is more complicated.B、Service and switch modules are underutilized.C、Layer 2 adjacency is required with the servers that use this design.D、Layer 3 adjacency is required with the servers that use this design.E、Load balancing will always occur across both access layer uplinks.
Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".
Which of the following describe router functions?()A、Packet switchingB、Collision prevention on a LAN segmentC、Packet filteringD、Broadcast domain enlargementE、Broadcast forwardingF、Internetwork communication
Which three statements describe how the strict SQL mode provides added security?()A、It rejects statements that try to insert out-of-range valuesB、It rejects invalid datesC、It limits the operations that the server can performD、It rejects queries that produce out-of-range valuesE、It rejects dates with zero day or month values
Which four statements correctly describe functions that are available in SQL? ()A、INSTR returns the numeric position of a named character.B、NVL2 returns the first non-null expression in the expression list.C、TRUNCATE rounds the column, expression, or value to n decimal places.D、DECODE translates an expression after comparing it to each search value.E、TRIM trims the heading of trailing characters (or both) from a character string.F、NVL compares two expressions and returns null if they are equal, or the first expression of they are not equal.G、NULLIF compares twp expressions and returns null if they are equal, or the first expression if they are not equal.
Which three statements correctly describe the functions and use of constraints? ()A、Constraints provide data independence.B、Constraints make complex queries easy.C、Constraints enforce rules at the view level.D、Constraints enforce rules at the table level.E、Constraints prevent the deletion of a table if there are dependencies.F、Constraints prevent the deletion of an index if there are dependencies.
多选题Refer to the exhibit. Which three statements are true about trust boundaries in the campus network? (Choose three.)()AA device is trusted if it correctly classifies packets.BA device is trusted if it correctly declassifies packets.CThe outermost trusted devices represent the trust boundary.DClassification and marking occur using 802.1ab QoS bits before reaching the trust boundary.ENetwork trust boundaries are automatically configured in IOS version 12.3 and later.FFor scalability, classification should be done as close to the edge as possible.
多选题Which two statements correctly describe UDLD? ()AUnidirectional link detection is achieved through monitoring STP BPDUs.BIt is recommended that it be enabled globally rather than on an individual port.CWhen an error is detected, normal mode will disable a port.DIt is recommended that it be enabled in normal mode.EIt is recommended that it be used with the loop guard feature.
多选题Which three statements correctly describe the features of the I/O calibration process?()AOnly one I/O calibration process can run at a timeBIt automates the resource allocation for the Automated Maintenance TasksCIt improves the performance of the performance-critical sessions while runningDIt can be used to estimate the maximum number of I/Os and maximum latency time for the systemEThe latency time is computed only when the TIMED_STATISTICS initialization parameter is set to TRUE
多选题Which of the following describe router functions?()APacket switchingBCollision prevention on a LAN segmentCPacket filteringDBroadcast domain enlargementEBroadcast forwardingFInternetwork communication
多选题Refer to the router topology shown in the graphic. Assuming that all routers are running OSPF, which statements correctly describe how the routers exchange routing information?()ADenmark exchanges with Utah, Paris, and Berlin.BUtah exchanges only with Denmark.CBerlin exchanges with Denmark, Utah, and Paris.DParis exchanges only with Denmark.EDenmark exchanges with only Paris and Utah.
多选题Which three statements describe how the strict SQL mode provides added security?()AIt rejects statements that try to insert out-of-range valuesBIt rejects invalid datesCIt limits the operations that the server can performDIt rejects queries that produce out-of-range valuesEIt rejects dates with zero day or month values
多选题Which three statements correctly describe the functions and use of constraints? ()AConstraints provide data independence.BConstraints make complex queries easy.CConstraints enforce rules at the view level.DConstraints enforce rules at the table level.EConstraints prevent the deletion of a table if there are dependencies.FConstraints prevent the deletion of an index if there are dependencies.
多选题Which three of the statements below correctly describe the characteristics of Autonomous Systems in routed networks?()AWithin an AS, all routers must run either BGP or IBGP.BAn AS uses exterior gatew ay protocols (EGPs) to exchange information with other autonomous systems.CAn AS is a group of routers under the same technical administration.DWithin an AS, routes learned through BGP can be redistributed using interior gateway protocols.EWi thin an AS, routes learned through an interior protocol cannot be redistributed using BGP to other autonomous systems.
多选题Which two statements correctly describe characteristics of the PortFast feature? ()ASTP will be disabled on the port.BPortFast can also be configured on trunk ports.CPortFast is required to enable port-based BPDU guard.DPortFast is used for both STP and RSTP host ports.EPortFast is used for STP-only host ports.
多选题Which of the following correctly describe the various functions and virtues of a router?()APacket switchingBCollision prevention on a LAN segment.CPacket filteringDBroadcast domain enlargementEBroadcast forwardingFInternetwork communication
多选题Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)Aincludes three design levelsBincorporates products and technologies into enterprise, service provider, and commercial systemsCextends the value of designs through a sustained development planDdoes not factor customer input design processEfacilitates faster and more reliable customer deploymentsFincorporates a narrow range of technologies and products
多选题Which three statements describe the User Datagram Protocol (UDP)?()AUDP provides delivery notification and error checking mechanisms.BUDP is faster than the Transmission Control Protocol (TCP).CUDP application examples include DNS and VoIP.DUDP is an application layer protocol.EUDP uses a best effort delivery approach.