网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()

  • A、The data is decrypted during SORT and JOIN operations.
  • B、The data remains encrypted when it is read into memory.
  • C、The data remains encrypted when it is stored in the redo logs.
  • D、The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.

参考答案

更多 “ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()A、The data is decrypted during SORT and JOIN operations.B、The data remains encrypted when it is read into memory.C、The data remains encrypted when it is stored in the redo logs.D、The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.” 相关考题
考题 ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()A. The data is decrypted during SORT and JOIN operations.B. The data remains encrypted when it is read into memory.C. The data remains encrypted when it is stored in the redo logs.D. The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.

考题 USER_DATA is a nonencrypted tablespace that contains a set of tables with data. You want to convert all existing data in the USER_DATA tablespace and the new data into the encrypted format.Which methodswould you use to achieve this?()A. Use Data Pump to transfer the existing data to a new encrypted tablespaceB. Use ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespaceC. Use CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespaceD. Enable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespaceE. Encrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted

考题 You created an encrypted tablespace:You then closed the encryption wallet because you were advised that this is secure.Later in the day, you attempt to create the EMPLOYEES table in the SECURESPACE tablespace with the SALT option on the EMPLOYEE column.Which is true about the result?()A. It creates the table successfully but does not encrypt any inserted data in the EMPNAME column because the wallet must be opened to encrypt columns with SALT.B. It generates an error when creating the table because the wallet is closed.C. It creates the table successfully, and encrypts any inserted data in the EMPNAME column because the wallet needs to be open only for tablespace creation.D. It generates error when creating the table, because the salt option cannot be used with encrypted tablespaces.

考题 In what location are EIGRP successor routes stored?() A. In the routing table only.B. In the neighbor table only.C. In the topology table only.D. In the routing table and neighbor table.E. In the routing table and topology table.F. In the topology table and neighbor table.

考题 Which three of these are major scaling, sizing, and performance considerations for an IPsec design?() A. connection speedB. number of remote sitesC. features to be supportedD. types of devices at the remote siteE. whether packets are encrypted using 3DES or AESF. number of routes in the routing table at the remote site

考题 tr的英文全称是()。A、table rowB、table dateC、table headerD、table

考题 Which three of these are major scaling, sizing, and performance considerations for an IP secdesign? ()A、 connection speedB、 number of remote sitesC、 features to be supportedD、 types of devices at the remote siteE、 whether packets are encrypted using 3DES or AESF、 number of routes in the routing table at the remote site

考题 In what location are EIGRP successor routes stored?()A、In the routing table only.B、In the neighbor table only.C、In the topology table only.D、In the routing table and neighbor table.E、In the routing table and topology table.F、In the topology table and neighbor table.

考题 Which syntax turns an existing constraint on?()A、ALTER TABLE table_name ENABLE constraint_name;B、ALTER TABLE table_name STATUS = ENABLE CONSTRAINT constraint_name;C、ALTER TABLE table_name ENABLE CONSTRAINT constraint_name;D、ALTER TABLE table_name STATUS ENABLE CONSTRAINT constraint_name;E、ALTER TABLE table_name TURN ON CONSTRAINT constraint_name;

考题 Refer to the exhibit. What does the option secret 5 in the username global configuration mode commandindicate about the enable secret password?()A、It is hashed using SHAB、It is encrypted using DH group 5C、It is hashed using MD5D、It is encrypted via the service password-encryption commandE、It is hashed using a proprietary Cisco hashing algorithmF、It is encrypted using a proprietary Cisco encryption algorithm

考题 How does using the service password encryption command on a router provide additional security?()A、by encrypting all passwords passing through the routerB、by encrypting passwords in the plain text configuration fileC、by requiring entry of encrypted passwords for access to the deviceD、by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchangesE、by automatically suggesting encrypted passwords for use in configuring the router

考题 Which action(s) will cause a compression dictionary to be removed from a table?()A、Set the table COMPRESS attribute to NO.  B、Set the table COMPRESS attribute to NO; run REORG against the table.  C、Set the table COMPRESS attribute to NO; run INSPECTRESETDICTIONARY against the table.  D、Set the table COMPRESS attribute to NO; run RUNSTATS against the table.

考题 As the administrator of your company’s network, you have implemented encryption for extra security of data on your network. A user moves an encrypted file from an NTFS partition on her Windows 2000 Workstation to an NTFS folder on a remote Windows 2000 Server. What effect will this have on the encrypted file?()A、The encrypted file will automatically be decrypted.B、Encrypted files and folders cannot be moved or copied, decrypt it first then move or copy thefile or folder.C、The encrypted file will remain encrypted in the Windows 2000 folder.D、The encrypted file will inherit the encryption state of the remote NTFS folder.

考题 You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()A、Move the encrypted data to a folder on ATLFP2 over an IPSec connectionB、Move the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connectionC、Move the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2D、Move the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL

考题 单选题In what location are EIGRP successor routes stored?()A In the routing table only.B In the neighbor table only.C In the topology table only.D In the routing table and neighbor table.E In the routing table and topology table.F In the topology table and neighbor table.

考题 单选题What is the effect of using the service password-encryption comma()。A Only the enable password will be encrypted.B Only the enable secret password will be encrypted.C Only passwords configured after the command has been entered will be encrypted.D It will encrypt the secret password and remove the enable secret password fromthe configuration.E It will encrypt all current and future passwords.

考题 单选题Evaluate the following command:   SQL CREATE TABLE design_data (id NUMBER, doc CLOB)  LOB(doc) STORE AS SECUREFILE(DEDUPLICATE);   Which statement is true regarding the above command?()A  The LOB values are automatically compressed.B  The LOB values are cached by default in the buffer cache.C  The LOB values are automatically stored in encrypted mode.D  All LOB data that is identical in two or more rows in a LOB column share the same data blocks.

考题 单选题Refer to the exhibit. What does the option secret 5 in the username global configuration mode commandindicate about the enable secret password?()A It is hashed using SHAB It is encrypted using DH group 5C It is hashed using MD5D It is encrypted via the service password-encryption commandE It is hashed using a proprietary Cisco hashing algorithmF It is encrypted using a proprietary Cisco encryption algorithm

考题 多选题Which two partitioned table maintenance operations support asynchronous Global Index Maintenance inOracle database 12c?()AALTER TABLE SPLIT PARTITIONBALTER TABLE MERGE PARTITIONCALTER TABLE TRUNCATE PARTITIONDALTER TABLE ADD PARTITIONEALTER TABLE DROP PARTITIONFALTER TABLE MOVE PARTITION

考题 单选题ENCRYPT_TS is an encrypted tablespace that contains tables with data. Which statement is true regarding the effect of queries and data manipulation language (DML) statements on the encrypted data in the tables?()A The data is decrypted during SORT and JOIN operations.B The data remains encrypted when it is read into memory.C The data remains encrypted when it is stored in the redo logs.D The data remains encrypted in the UNDO tablespace provided that the UNDO tablespace was created with the encryption option enabled.

考题 多选题Which three of these are major scaling, sizing, and performance considerations for an IP secdesign? ()Aconnection speedBnumber of remote sitesCfeatures to be supportedDtypes of devices at the remote siteEwhether packets are encrypted using 3DES or AESFnumber of routes in the routing table at the remote site

考题 多选题Which two operations can be performed on an external table()ACreate a view on the table.BCreate an index on the table.CCreate a synonym on the table.DAdd a virtual column to the table.EUpdate the table using the UPDATE statement.FDelete rows in the table using the DELETE command

考题 单选题Which syntax turns an existing constraint on?()A ALTER TABLE table_name ENABLE constraint_name;B ALTER TABLE table_name STATUS = ENABLE CONSTRAINT constraint_name;C ALTER TABLE table_name ENABLE CONSTRAINT constraint_name;D ALTER TABLE table_name STATUS ENABLE CONSTRAINT constraint_name;E ALTER TABLE table_name TURN ON CONSTRAINT constraint_name;

考题 单选题You created an encrypted tablespace: You then closed the encryption wallet because you were advised that this is secure. Later in the day, you attempt to create the EMPLOYEES table in the SECURESPACE tablespace with the SALT option on the EMPLOYEE column. Which is true about the result?()A It creates the table successfully but does not encrypt any inserted data in the EMPNAME column because the wallet must be opened to encrypt columns with SALT.B It generates an error when creating the table because the wallet is closed.C It creates the table successfully, and encrypts any inserted data in the EMPNAME column because the wallet needs to be open only for tablespace creation.D It generates error when creating the table, because the salt option cannot be used with encrypted tablespaces.

考题 多选题USER_DATA is a nonencrypted tablespace that contains a set of tables with data. You want to convert all existing data in the USER_DATA tablespace and the new data into the encrypted format. Which methodswould you use to achieve this?()AUse Data Pump to transfer the existing data to a new encrypted tablespaceBUse ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespaceCUse CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespaceDEnable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespaceEEncrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted

考题 单选题As the administrator of your company’s network, you have implemented encryption for extra security of data on your network. A user moves an encrypted file from an NTFS partition on her Windows 2000 Workstation to an NTFS folder on a remote Windows 2000 Server. What effect will this have on the encrypted file?()A The encrypted file will automatically be decrypted.B Encrypted files and folders cannot be moved or copied, decrypt it first then move or copy thefile or folder.C The encrypted file will remain encrypted in the Windows 2000 folder.D The encrypted file will inherit the encryption state of the remote NTFS folder.