-
Which three SELECT statements displays 2000 in the format “$2,000.00”?()
A . SELECT TO CNAR(2000, ‘$#,###.##’) FROM dual;
B . SELECT TO CNAR(2000, ‘$0,000.00’) FROM dual;
C . SELECT TO CNAR(2000, ‘$9,999.00’) FROM dual;
D . SELECT TO CNAR(2000, ‘$9,999.99’) FROM dual;
E . SELECT TO CNAR(2000, ‘$2,000.00’) FROM dual;
F . SELECT TO CNAR(2000, ‘$N,NNN.NN’) FROM dual
-
Which three statements are true regarding the data types in Oracle Database 10g/11g?()
A . Only one LONG column can be used per table
B . A TIMESTAMP data type column stores only time values with fractional seconds
C . The BLOB data type column is used to store binary data in an operating system file
D . The minimum column width that can be specified for a VARCHAR2 data type column is one
E . The value for a CHAR data type column is blank-padded to the maximum defined column width
-
Examine the query and its output executed In an RDBMS Instance:Which three statements are true about the users (other than sys) in the output?()
A . The C # # B_ADMIN user can perform all backup and recovery operations using RMAN only.
B . The C # # C_ADMIN user can perform the data guard operation with Data Guard Broker.
C . The C # # A_ADMIN user can perform wallet operations.
D . The C # # D_ADMIN user can perform backup and recovery operations for Automatic Storage Management (ASM).
E . The C # # B_ADMIN user can perform all backup and recovery operations using RMAN or SQL* Plus.
-
Which three statements are true about the working of system privileges in a multitenant control database(CDB) that has pluggable databases (PDBs)?()
A . System privileges apply only to the PDB in which they are used.
B . Local users cannot use local system privileges on the schema of a common user.
C . The granter of system privileges must possess the set container privilege.
D . Common users connected to a PDB can exercise privileges across other PDBs.
E . System privileges with the with grant option container all clause must be granted to a common user before the common user can grant privileges to other users.
-
Which three statements describe the configuration change management feature in DCNM LAN? ()
A . Switch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.
B . DCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.
C . You can archive a maximum of 50 configuration versions per managed device.
D . Managed devices must be licensed in DCNM LAN before they can be used with configuration change management.
E . Device-running configuration will be archived only if it differs from the last archived version.
-
In relation to MPLS Multicast VPN, which three statements about multicast distribution (MDT) groups aretrue? ()
A . Default MDT groups are used for PIM control traffic, low-bandwidth sources, and flooding of sparse mode traffic.
B . MDTs are built in customer networks
C . Data MDT groups are used for high-bandwidth sources to reduce replication to uninterested PEs.
D . MDTs are built in provider networks
E . The number of MDTs depends on PIM modes of MDT groups.
-
Which three statements are true about the privileged connection options available in Oracle9i?()
A . The CONNECT INTERNAL is disallowed.
B . The Server Manager tool is no longer supplied.
C . The listener must be running to make a connection.
D . The use of remote password login file (orapw<sid>) is unchanged.
-
Which three statements are true when the listener handles connection requests to an Oracle 12cdatabase instance with multithreaded architecture enabled In UNIX?()
A . Thread creation must be routed through a dispatcher process
B . The local listener may spawn a now process and have that new process create a thread
C . Each Oracle process runs an SCMN thread.
D . Each multithreaded Oracle process has an SCMN thread.
E . The local listener may pass the request to an existing process which in turn will create a thread.
-
In order to enhance worker productivity, a Cisco wireless network has been implemented at all locations. Which three statements regarding WLAN are true?()
A . A WLAN client will operate in half-duplex mode.
B . The Aironet 1230 access point is an example of an access point that operates solely as a lightweight access point.
C . Ad hoc mode allows mobile clients to connect directly without an intermediate AP.
D . WLANs are designed to share the medium and can easily handle an increased demand of channel contention.
E . A lightweight AP receives control and configuration from a WLAN controller to which it is associated.
F . Another term for infrastructure mode is independent service set (IBSS).
-
Which three statements describe the functionality of the DO_KEY built-in?()
A . It accepts both a built-in and a key name as argument.
B . If no key trigger is defined, the specified built-in executes.
C . Its parameter must be specified in upper case, enclosed in single quotation marks.
D . It performs the same task as if you pressed the function key associated with the specified argument.
E . It executes the key trigger that corresponds to the built-in specified as its parameter.&e
-
The InnoDB engine has a feature known as clustered indexes. Which three statements are true about clustered indexes as used in InnoDB?()
A . A primary key must exist for creation of a clustered index
B . A clustered index allows fulltext searching within InnoDB
C . The first unique index is always used as a clustered index and not a primary key
D . A clustered index provides direct access to a page containing row data
E . If no indexes exist, a hidden clustered index is generated based on row IDs
F . A primary key is used as a clustered index
G . A clustered index is a grouping of indexes from different tables into a global index for faster searching
-
Which three statements are correct about the differences in IS - IS and OSPF?()
A . IS - IS is more CPU - intensive than is OSPF
B . For greater fine tuning there are more IS - IS timers
C . IS - IS LSP con tains TLV fields and OSPF LSU contains the LSAs
D . New additions to the protocol are easily implemented in OSPF but not with IS - IS
E . OSPF has more area types than does IS - IS
-
Which three statements best describe multicast operation on Cisco Nexus switches in a data center?()
A . Cisco NX-OS Software does not support PIM dense mode.
B . The command ip multicast-routing must be enabled in Cisco NX-OS Software before any multicast configuration is possible on the switch.
C . PIM CLI configuration and verification commands are not available until you enable the PIM feature with the feature pim command.
D . Cisco NX-OS Software supports multicast routing per Layer 3 VRF instance.
E . The default PIM operational mode on the Cisco Nexus 7000 switch is SSM.
-
Which three SELECT statements displays 2000 in the format "$2,000.00"? ()
A . SELECT TO CNAR(2000, '$#,###.##') FROM dual;
B . SELECT TO CNAR(2000, '$0,000.00') FROM dual;
C . SELECT TO CNAR(2000, '$9,999.00') FROM dual;
D . SELECT TO CNAR(2000, '$9,999.99') FROM dual;
E . SELECT TO CNAR(2000, '$2,000.00') FROM dual;
F . SELECT TO CNAR(2000, '$N,NNN.NN') FROM dual
-
Which three statements describe user authentication in Cisco DCNM-LAN? ()
A . Cisco DCNM-LAN server users are local to the Cisco DCNM-LAN server. Creating, changing, and removing Cisco DCNM-LAN server users has no effect on user accounts on managed devices.
B . A Cisco DCNM-LAN server user that has Administrator privileges can push out changes to managed devices even if the Cisco NX-OS role that is used on the discovered device has the network operator role.
C . Cisco DCNM-LAN user roles restrict the ability of users to make changes to Cisco DCNM-LAN server settings. Cisco NX-OS user roles enforce read/write privileges on the discovered devices.
D . Cisco DCNM-LAN allows you to configure unique credentials for each discovered device or use default credentials when you do not configure unique credentials for a device.
E . Cisco DCNM-LAN can use AAA servers to authenticate users. Only TACACS servers are supported.
-
Refer to the exhibit. Which three statements are true about trust boundaries in the campus network? (Choose three.)()https://assets.asklib.com/images/image2/2018072411062788011.jpg
A . A device is trusted if it correctly classifies packets.
B . A device is trusted if it correctly declassifies packets.
C . The outermost trusted devices represent the trust boundary.
D . Classification and marking occur using 802.1ab QoS bits before reaching the trust boundary.
E . Network trust boundaries are automatically configured in IOS version 12.3 and later.
F . For scalability, classification should be done as close to the edge as possible.
-
Which three are the valid statements in relation to SQL plan baselines?()
A . The plans can be manually loaded to the SQL plan baseline.
B . The plans in the SQL plan baseline are verified and accepted plans.
C . The plans generated for every SQL statement are stored in the SQL plan baseline by default.
D . The plan baselines are stored temporarily in the memory as long as the database instance is running.
E . For the SQL plan baselines to be accessible to the optimizer, the SYSAUX tablespace must be online.
-
Which three statements are true about using flashback database in a multitenant container database(CDB)?()
A . The root container can be flashed back without flashing back the pluggable databases (PDBs).
B . To enable flashback database, the CDB must be mounted.
C . Individual PDBs can be flashed back without flashing back the entire cdb.
D . The DB_FLASHBACK RETENTION_TARGET parameter must be set to enable flashback of the cdb.
E . A CDB can be flashed back specifying the desired target point in time or an SCN, but not a restore point.
-
Which three statements are possible causes for the "fltAdaptorHostIfLink-down" fault in UCS Manager? ()
A . The fabric interconnect is in the end-host mode, and all uplink ports have failed.
B . The server port to which the adapter is pinned has failed.
C . A transient error has caused the link to fail.
D . The fabric interconnect is in the switch mode, and all uplink ports have failed.
E . The link for a network-facing host interface is missing.
-
Which three of the statements below correctly describe the characteristics of Autonomous Systems in routed networks?()
A . Within an AS, all routers must run either BGP or IBGP.
B . An AS uses exterior gatew ay protocols (EGPs) to exchange information with other autonomous systems.
C . An AS is a group of routers under the same technical administration.
D . Within an AS, routes learned through BGP can be redistributed using interior gateway protocols.
E . Wi thin an AS, routes learned through an interior protocol cannot be redistributed using BGP to other autonomous systems.
-
Which three are the valid statements in relation to SQL plan baselines?()
A . The plans can be manually loaded to the SQL plan baseline.
B . The plans in the SQL plan baseline are verified and accepted plans.
C . The plans generated for every SQL statement are stored in the SQL plan baseline by default.
D . The plan baselines are stored temporarily in the memory as long as the database instance is running.
E . For the SQL plan baselines to be accessible to the optimizer, the SYSAUX tablespace must be online.
-
Which three statements are true about implementing wireless LANs in the network using Ciscodevices?()
A . Antenna power is a relative value reference to dBi
B . LWAPP allows encrypted communications between lightweight access points and WLANcontrollers.
C . Characteristics of antennas are directionality, gain, and polarization
D . Power over Ethernet (PoE) is only available when a WLAN controller is integrated into thenetwork
E . The WLAN solution Engine (WLSE) is used to control lightweight access points
F . One of the advantages of the lightweight WLAN solution is that the devices act indepently
-
Which three SELECT statements display 2000 in the format "$2,000.00"? ()
A . SELECT TO_CHAR(2000, '$#,###.##') FROM dual;
B . SELECT TO_CHAR(2000, '$0,000.00') FROM dual;
C . SELECT TO_CHAR(2000, '$9,999.00') FROM dual;
D . SELECT TO_CHAR(2000, '$9,999.99') FROM dual;
E . SELECT TO_CHAR(2000, '$2,000.00') FROM dual;
F . SELECT TO_CHAR(2000, '$N,NNN.NN') FROM dual
-
Identify three scenarios in which you would recommend the use of SQL Performance Analyzer to analyzeimpact on the performance of SQL statements.()
A . Change in the Oracle Database version
B . Change in your network infrastructure
C . Change in the hardware configuration of the database server
D . Migration of database storage from non-ASM to ASM storage
E . Database and operating system upgrade
-
Which three statements are true when the listener handles connection requests to an Oracle 12cdatabase instance with multithreaded architecture enabled In UNIX?()
A. Thread creation must be routed through a dispatcher process
B. The local listener may spawn a now process and have that new process create a thread
C. Each Oracle process runs an SCMN thread.
D. Each multithreaded Oracle process has an SCMN thread.
E. The local listener may pass the request to an existing process which in turn will create a thread.