Which of the following methods can be used to detect block c

题目
单选题
Which of the following methods can be used to detect block corruption?()
A

 ANALYZE operations

B

 dbv

C

 SQL queries that access the potentially corrupt block

D

 RMAN

E

 All of the above

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following technologies can detect and fix single bit memory errors?()

A. RAID

B. Registered memory

C. SDRAM

D. ECC


参考答案:D

第2题:

Which of the following best describes a hash function?()

  • A、An irreversible fast encryption method
  • B、A reversible fast encryption method
  • C、A reversible value computed from a piece of data and used to detect modifications
  • D、An irreversible value computed froma piece of data and used to detect modifications
  • E、A table inwhich values are stored for efficient retrieval.

正确答案:D

第3题:

Which of the following methods is used to increase the number of processes sharing the CPU?

A.Interrupt

B.Scheduler

C.Swapping

D.Working Set


正确答案:C

第4题:

Which of the following encryption methods is often used along with L2TP?()

  • A、S/MIME
  • B、SSH
  • C、3DES
  • D、IPSec

正确答案:D

第5题:

Which of the following statements are true? ()

  • A、 RC4 is a stream cipher
  • B、 Stream ciphers require padding
  • C、 AES is a block cipher
  • D、 DES and 3DES are stream ciphers
  • E、 AES is a stream cipher
  • F、 AES, DES, and 3DES can be used as HMAC algorithms

正确答案:A,C

第6题:

Which of the following methods can move files in clear text and can be easily intercepted?()

A.RSH

B.SNMP

C.FTP

D.TELNET


参考答案:C

第7题:

Which two statements are true about the RMAN validate database command?()

  • A、It checks the database for intrablock corruptions.
  • B、It can detect corrupt pfiles.
  • C、It can detect corrupt spfiles.
  • D、It checks the database for interblock corruptions.
  • E、It can detect corrupt block change tracking files.

正确答案:A,C

第8题:

Which two statements are true about the RMAN validate database command?()

A. It checks the database for intrablock corruptions.

B. It can detect corrupt pfiles.

C. It can detect corrupt spfiles.

D. It checks the database for interblock corruptions.

E. It can detect corrupt block change tracking files.


参考答案:A, C

第9题:

Which of the following methods can move files in clear text and can be easily intercepted?()

  • A、RSH
  • B、SNMP
  • C、FTP
  • D、TELNET

正确答案:C

第10题:

Which of the following methods can be used to apply a file system to a hard drive partition?()

  • A、Device Manager MMC
  • B、Format Command
  • C、Disk Management MMC
  • D、Windows Explorer Menus
  • E、FDISK Command

正确答案:B,C

更多相关问题