Which two statements

题目

Which two statements are true about standard database auditing()

  • A、DDL statements can be audited.
  • B、Statements that refer to stand-alone procedure can be audited.
  • C、Operations by the users logged on as SYSDBA cannot be audited.
  • D、Only one audit record is ever created for a session per audited statement even though it is executedmore than once.
参考答案和解析
正确答案:A,B
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements are true about pool-based source NAT? ()(Choose two.)

A. PAT is not supported.

B. PAT is enabled by default.

C. It supports the address-persistent configuration option.

D. It supports the junos-global configuration option.


参考答案:B, C

第2题:

Which two statements are true with regard to policy ordering? ()(Choose two.)

A. The last policy is the default policy, which allows all traffic.

B. The order of policies is not important.

C. New policies are placed at the end of the policy list.

D. The insert command can be used to change the order.


参考答案:C, D

第3题:

Which of the following statements about ORACLE is (are) correct?

Ⅰ.ORACLE follows SQL standard

Ⅱ.ORACLE database defines two logical types: table and view

A.Ⅰonly

B.Ⅱ only

C.Ⅰ and Ⅱ

D.none of the above


正确答案:C

第4题:

Which two statements are true about L2TP tunnels?() (Choose two.)

  • A、Traffic is clear text
  • B、Traffic is encrypted 
  • C、They are initiated by the LNS
  • D、They are initiated by the LAC

正确答案:A,D

第5题:

Which two statements are true about precedence values in policy?() (Choose two.)

A. 1 is the default precedence.

B. A lower number is preferred.

C. A higher number is preferred.

D. 100 is the default precedence.


参考答案:B, D

第6题:

Which two statements are true about AH?() (Choose two.)

A. AH provides data integrity.

B. AH is identified by IP protocol 50.

C. AH is identified by IP protocol 51.

D. AH cannot work in conjunction with ESP


参考答案:A, C

第7题:

Which two statements regarding symmetric key encryption are true?() (Choose two.)

A. The same key is used for encryption and decryption.

B. It is commonly used to create digital certificate signatures.

C. It uses two keys: one for encryption and a different key for decryption.

D. An attacker can decrypt data if the attacker captures the key used for encryption.


参考答案:A, D

第8题:

Examine the structure of the EMPLOYEES, DEPARTMENTS, and LOCATIONS tables.Which two SQL statements produce the name, department name, and the city of all the employees who earn more then 10000?()

A.

B.

C.

D.


参考答案:B, D

第9题:

Which two statements are true regarding L2TP? ()(Choose two.)

A. Tunnels are initiated by the LAC

B. Tunnels are initiated by the LNS

C. By default, subscriber authentication occurs on the LNS

D. By default, subscriber authentication occurs on the LAC


参考答案:A, C

第10题:

Which two statements accurately describe an IBGP peering session?() (Choose two.)

  • A、Peers are statically defined.
  • B、Peers exist within the same AS.
  • C、Peers must be directly connected to each other.
  • D、Peers advertise routes learned from other IBGP neighbors.

正确答案:A,B

更多相关问题