indexes are maintained by cache entry ownes
an application should not suggest an index that another aplication had suggested
indexes cannot be sorted
each application using Coherence may suggest the same set of indexes when it starts
第1题:
A. It cannot generate recommendations that support multiple workload queries.
B. It can recommend partitioning on tables provided that the workloads have some predicates and joins on the columns of the NUMBER or DATE type.
C. It can recommend partitioning only on tables that have at least 10,000 rows.
D. It can recommend only B-tree indexes and not bitmap or function-based indexes
第2题:
A. The same key is used for encryption and decryption.
B. It is commonly used to create digital certificate signatures.
C. It uses two keys: one for encryption and a different key for decryption.
D. An attacker can decrypt data if the attacker captures the key used for encryption.
第3题:
A. All the related indexes and views are automatically dropped
B. The flashback drop feature can recover only the table structure
C. Only the related indexes are dropped whereas views are invalidated
D. The flashback drop feature can recover both the table structure and its data
第4题:
Which two statements are true regarding L2TP? ()(Choose two.)
第5题:
Which two statements are true regarding the role of the Routing Engine (RE)?()
第6题:
A. All the related indexes and views are automatically dropped
B. The flashback drop feature can recover only the table structure
C. Only the related indexes are dropped whereas views are invalidated
D. The flashback drop feature can recover both the table structure and its data
第7题:
A. Tunnels are initiated by the LAC
B. Tunnels are initiated by the LNS
C. By default, subscriber authentication occurs on the LNS
D. By default, subscriber authentication occurs on the LAC
第8题:
A. It stores only the temporary table but not its indexes.
B. It stores both the temporary table as well as its indexes.
C. It must be a nondefault temporary tablespace for the database.
D. It can be a default or nondefault temporary tablespace for the database.
E. It must be the default temporary tablespace of the user who issues the command.
第9题:
Which two statements are true regarding high-availability chassis clustering?()
第10题:
Which two statements regarding asymmetric key encryption are true?()