网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which three scenarios are true about Domains?()
A

Domains can be created using the Configuration Wizard.

B

Domains can be created using WLST.

C

Domain configuration files are located in the WebLogic home directory.

D

Domains can be created based on a domain template.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which three scenarios are true about Domains?()ADomains can be created using the Configuration Wizard.BDomains can be created using WLST.CDomain configuration files are located in the WebLogic home directory.DDomains can be created based on a domain template.” 相关考题
考题 Which two statements are true about the rescue configuration file?() A. It must include a root password.B. It is rollback file number 50, and you can recover it by issuing rollback 50.C. It is created by issuing request system configuration rescue save.D. It is updated automatically when you commit.

考题 An SVI has been configured on a device. Which two statements are true about a switched virtualinterface (SVI)?()A、An SVI is normally created for the default VLAN (VLAN1) to permit remote switchadministrationB、Multiple SVIs can be associated with a VLANC、SVI is another name for a routed portD、An SVI is created by entering the no switchport command in interface configuration modeE、An SVI provides a default gateway for a VLAN

考题 Which three statements are true when configuring Cisco IOS Firewall features using the SDM? ()A、A custom application security policy can be configured in the Advanced Firewall Security Configuration dialog box.B、An optional DMZ interface can be specified in the Advanced Firewall Interface Configuration dialog box.C、Custom application policies for e-mail, instant messaging, HTTP, and peer-to-peer services can be created using the Intermediate Firewall wizard.D、Only the outside (untrusted) interface is specified in the Basic Firewall Interface Configuration dialog box.E、The outside interface that SDM can be launched from is configured in the Configuring Firewall for Remote Access dialog box.F、The SDM provides a basic, intermediate, and advanced firewall wizard.

考题 Which are valid statements about Cisco Virtual Interface Card (VIC)? ()A、 The Cisco VIC can create an unlimited number of Virtual NICsB、 The number of vNICs on the Cisco VIC that can be created is determined by the number of chassis uplinksC、 vNICs are created using software on the host operating systemD、 The host operating system sees a vNIC as a physical PCIe deviceE、 The host operating system sees a vNIC as a sub-interface of a primary NICF、 The Cisco VIC can create 1024 vNICs

考题 Your database in running in the ARCHIVELOG mode. You issue the following command to back up datafile 2 in your database.   RMAN COPY DATAFILE 2 TO ’D:///ORACLE/ORA90/MYNEWDB/DA2.DBF’;   Which two statements are true regarding the backup created using this command?()A、 The copy of the datafile created is stored in the RMAN repository.B、 The copy of the datafile created can be viewed using the LIST BACKUP command.C、 The copy of the datafile created using this COPY command can be placed only on the disk.D、 The copy of the datafile created is similar to the backup of the file created using the BACKUP command.E、 The copy of the datafile created can be used for recovering the database using the user-managed recovery method.

考题 Which two statements are true about the rescue configuration file?()A、It must include a root passwordB、It is roll back file number 50, and you can recover it by issuing rollback 50C、It is created by issuing request system configuration rescue saveD、It is updated automatically when you commit

考题 Which two statements are true about the rescue configuration file?()A、It must include a root password.B、It is rollback file number 50, and you can recover it by issuing rollback 50.C、It is created by issuing request system configuration rescue save.D、It is updated automatically when you commit.

考题 Which three scenarios are true about Domains?()A、Domains can be created using the Configuration Wizard.B、Domains can be created using WLST.  C、Domain configuration files are located in the WebLogic home directory.D、Domains can be created based on a domain template.

考题 Which two statements regarding a SQL profile are true?()A、 It is built by Automatic Tuning Optimizer.B、 It cannot be stored persistently in the data dictionary.C、 It can be used by the query optimizer automatically.D、 It can be created manually by using the CREATE PROFILE command.

考题 Which statement is true when Automatic Workload Repository (AWR) baselines are created using baseline templates?()A、AWR baselines are always created as repeating baselines.B、AWR baselines can be created on the basis of two time values.C、AWR baselines are always created with infinite expiration duration.D、AWR baselines are always created using the Automatic Workload Repository (AWR) retention period as expirationduration.

考题 Which statement is true when Automatic Workload Repository (AWR) baselines are created using baseline templates?()  A、 AWR baselines are always created as repeating baselines.B、 AWR baselines can be created on the basis of two time values.C、 AWR baselines are always created with infinite expiration duration.D、 AWR baselines are always created using the Automatic Workload Repository (AWR) retention period as expiration duration.

考题 You have created an Oracle 10g database named SALES, which will be used by an application named SalesOrders. Users of the SalesOrders application complain that application response time is slow when they generate reports. The SalesOrders application accesses a table that contains 10 million rows. You decide to create an index on this table using the NOLOGGING option so that the index creation process is completed in the least amount of time. Which of the following is NOT true about an index created with the NOLOGGING option?()A、 The index can be changed from NOLOGGING to LOGGINGB、 The index cannot be recovered even in the ARCHIVELOG mode.C、 The index can only be created if the base table is created with the NOLOGGING option.D、 The index can be recovered if you perform a backup after the CREATE INDEX statement.

考题 View this parameter setting in your database:   DB_CREATE_FILE_DEST=’D:// /oracle/product/10.2.0/oradata/oracle’  You created a tablespace by using this command:   CREATE TABLESPACE USERS;  Which two statements are true about the USERS tablespace?()A、The tablespace has two data files.B、An error is reported and tablespace creation fails.C、Data files are created with names generated by the instance.D、The tablespace can be extended without specifying the data file.E、Data files belonging to the USERS tablespace cannot be renamed.

考题 Which two statements about creating constraints are true?()A、Constraint names must start with SYS_CB、All constraints must be defines at the column level.C、Constraints can be created after the table is created.D、Constraints can be created at the same time the table is created.E、Information about constraints is found in the VIEW_CONSTRAINTS dictionary view.

考题 多选题Which statements are true regarding the creation of an incident package file by using the EM WorkbenchSupport()AYou can add SQL test cases to the incident package.BYou can add or remove the trace files to the package.CYou cannot create an incremental incident package when the physical files are purged from the ADR.DYou can create the incremental incident package ZIP file for new or modified diagnostic information for theincident package already created.

考题 多选题Your database in running in the ARCHIVELOG mode. You issue the following command to back up datafile 2 in your database.   RMAN COPY DATAFILE 2 TO ’D:///ORACLE/ORA90/MYNEWDB/DA2.DBF’;   Which two statements are true regarding the backup created using this command?()AThe copy of the datafile created is stored in the RMAN repository.BThe copy of the datafile created can be viewed using the LIST BACKUP command.CThe copy of the datafile created using this COPY command can be placed only on the disk.DThe copy of the datafile created is similar to the backup of the file created using the BACKUP command.EThe copy of the datafile created can be used for recovering the database using the user-managed recovery method.

考题 多选题Which two statements are true about the rescue configuration file?()AIt must include a root passwordBIt is roll back file number 50, and you can recover it by issuing rollback 50CIt is created by issuing request system configuration rescue saveDIt is updated automatically when you commit

考题 多选题An SVI has been configured on a device. Which two statements are true about a switched virtualinterface (SVI)?()AAn SVI is normally created for the default VLAN (VLAN1) to permit remote switchadministrationBMultiple SVIs can be associated with a VLANCSVI is another name for a routed portDAn SVI is created by entering the no switchport command in interface configuration modeEAn SVI provides a default gateway for a VLAN

考题 多选题Which are valid statements about Cisco Virtual Interface Card (VIC)? ()AThe Cisco VIC can create an unlimited number of Virtual NICsBThe number of vNICs on the Cisco VIC that can be created is determined by the number of chassis uplinksCvNICs are created using software on the host operating systemDThe host operating system sees a vNIC as a physical PCIe deviceEThe host operating system sees a vNIC as a sub-interface of a primary NICFThe Cisco VIC can create 1024 vNICs

考题 多选题Which two statements regarding a SQL profile are true?()AIt is built by Automatic Tuning Optimizer.BIt cannot be stored persistently in the data dictionary.CIt can be used by the query optimizer automatically.DIt can be created manually by using the CREATE PROFILE command.

考题 多选题Which two statements about creating constraints are true?()AConstraint names must start with SYS_CBAll constraints must be defines at the column levelCConstraints can be created after the table is createdDConstraints can be created at the same time the table is createdEInformation about constraints is found in the VIEW_CONSTRAINTS dictionary view

考题 多选题Which three statements are true when configuring Cisco IOS Firewall features using the SDM? ()AA custom application security policy can be configured in the Advanced Firewall Security Configuration dialog box.BAn optional DMZ interface can be specified in the Advanced Firewall Interface Configuration dialog box.CCustom application policies for e-mail, instant messaging, HTTP, and peer-to-peer services can be created using the Intermediate Firewall wizard.DOnly the outside (untrusted) interface is specified in the Basic Firewall Interface Configuration dialog box.EThe outside interface that SDM can be launched from is configured in the Configuring Firewall for Remote Access dialog box.FThe SDM provides a basic, intermediate, and advanced firewall wizard.

考题 多选题Which two statements about creating constraints are true?()AConstraint names must start with SYS_CBAll constraints must be defines at the column level.CConstraints can be created after the table is created.DConstraints can be created at the same time the table is created.EInformation about constraints is found in the VIEW_CONSTRAINTS dictionary view.

考题 多选题Which two statements are true about simple views?()AViews can be created as read only.BViews are data segments like tables.CViews can be created on the basis of more than one table.DData manipulation language (DML) operations cannot be performed on views.

考题 多选题Which three scenarios are true about Domains?()ADomains can be created using the Configuration Wizard.BDomains can be created using WLST.CDomain configuration files are located in the WebLogic home directory.DDomains can be created based on a domain template.

考题 单选题Which statement is true when Automatic Workload Repository (AWR) baselines are created using baseline templates?()A  AWR baselines are always created as repeating baselines.B  AWR baselines can be created on the basis of two time values.C  AWR baselines are always created with infinite expiration duration.D  AWR baselines are always created using the Automatic Workload Repository (AWR) retention period as expiration duration.

考题 多选题View this parameter setting in your database:   DB_CREATE_FILE_DEST=’D:// /oracle/product/10.2.0/oradata/oracle’  You created a tablespace by using this command:   CREATE TABLESPACE USERS;  Which two statements are true about the USERS tablespace?()AThe tablespace has two data files.BAn error is reported and tablespace creation fails.CData files are created with names generated by the instance.DThe tablespace can be extended without specifying the data file.EData files belonging to the USERS tablespace cannot be renamed.

考题 多选题Which two statements are true about the rescue configuration file?()AIt must include a root password.BIt is rollback file number 50, and you can recover it by issuing rollback 50.CIt is created by issuing request system configuration rescue save.DIt is updated automatically when you commit.