Evaluate the following CREATE TABLE commands:
CREATE TABLE orders
(ord_no NUMBER(2) CONSTRAINT ord_pk PRIMARY KEY,
CREATE TABLE ord_items
qty NUMBER(3) CHECK (qty BETWEEN 100 AND 200),
expiry_date date CHECK (expiry_date > SYSDATE),
CONSTRAINT it_pk PRIMARY KEY (ord_no,item_no),
CONSTRAINT ord_fk FOREIGN KEY(ord_no) REFERENCES orders(ord_no));
The above command fails when executed. What could be the reason?
A. SYSDATE cannot be used with the CHECK constraint.
B. The BETWEEN clause cannot be used for the CHECK constraint.
C. The CHECK constraint cannot be placed on columns having the DATE data type.
D. ORD_NO and ITEM_NO cannot be used as a composite primary key because ORD_NO is also
the FOREIGN KEY.
The CHECK constraint defines a condition that each row must satisfy. The condition can use the same constructs as the query conditions, with the following exceptions:
References to the CURRVAL, NEXTVAL, LEVEL, and ROWNUM pseudocolumns Calls to SYSDATE, UID, USER, and USERENV functions
Queries that refer to other values in other rows
A single column can have multiple CHECK constraints that refer to the column in its definition. There is no limit to the number of CHECK constraints that you can define on a column. CHECK constraints can be defined at the column level or table level.
CREATE TABLE employees
salary NUMBER(8,2) CONSTRAINT emp_salary_min
CHECK (salary > 0),
Which of the following protocols operates at the HIGHEST level of the OSI model?
An administrator has a network subnet dedicated to a group of users. Due to concerns regarding data and network security, the administrator desires to provide network access for this group only. Which of the following would BEST address this desire?
A. Install a proxy server between the users’ computers and the switch to filter inbound network traffic.
B. Block commonly used ports and forward them to higher and unused port numbers.
C. Configure the switch to allow only traffic from computers based upon their physical address.
D. Install host-based intrusion detection software to monitor incoming DHCP Discover requests.
New Simulation: Crimp out a T568B.
White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown.
Users must be able to connect remotely from their own mobile devices.
What should the architect consider to increase the security of the current authentication solution?
A. Adding a second authentication factor
B. Placing domain controllers in the DMZ for remote users
C. Shortening the Active Directory password expiration period
D. Populating the RDS user profile path in the Active Directory user accounts
A Citrix Engineer needs to enable high availability on the XenServer host.
What are two requirements for the environment? (Choose two.)
A. Workload Balancing has to be disabled.
B. A static IP address must be set on the management interface.
C. XenServer hosts need to be part of a XenServer resource pool.
D. A dedicated management interface for high availability must be created.
E. A shared storage repository needs to be available for heartbeat and metadata.
An administrator is working to implement Storage Profiles in their environment. Which two ways can storage capabilities be generated? (Choose two.)
A. They are generated by Datastore Clusters as LUNs are added to the cluster.
B. They are automatically determined by the Storage Profile when it is created.
C. They can be retrieved from the array through the VMware APIs for Storage Awareness (VASA).
D. They can be manually generated by the administrator.
Understanding Storage Capabilities
A storage capability outlines the quality of service that a storage system can deliver. It is a guarantee that the storage system can provide a specific set of characteristics for capacity, performance, availability, redundancy, and so on.
If a storage system uses Storage APIs ?Storage Awareness, it informs vCenter Server that it can guarantee a specific set of storage features by presenting them as a storage capability. vCenter Server recognizes the capability and adds it to the list of storage capabilities in the Manage Storage Capabilities dialog box. Such storage capabilities are system-defined. vCenter Server assigns the system-defined storage capability to each datastore that you create from that storage system.
Because multiple system capabilities for a datastore are not supported, a datastore that spans several extents assumes the system capability of only one of its extents. You can create user-defined storage capabilities and associate them with datastores. You should associate the same user-defined capability with datastores that guarantee the same level of storage capabilities. You can associate a user-defined capability with a datastore that already has a system- defined capability. A datastore can have only one system-defined and only one user-defined capability at a time.
Based on the information shown in the attached exhibit, does the XenServer host have sufficient CPU resources available?
Click the Exhibit button to view a screenshot of the Performance Graphs for the XenServer host.
A. The CPU resources are sufficient, and NO upgrade is required.
B. The CPU resources are sufficient, but some virtual machines have occasional peaks.
C. The CPU resources are insufficient; upgrading or running fewer virtual machines is recommended.
D. The CPU resources are sufficient for now, but running additional virtual machines is NOT recommended.
Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table.
All client computers run either Windows 7 or Windows 8. The corporate security policy states that all of the client computers must have the latest security updates installed.
You need to implement a solution to ensure that only the client computers that have all of the required security updates installed can connect to VLAN 1. The solution must ensure that all other client computers connect to VLAN 3.
Solution: You implement the DHCP Network Access Protection (NAP) enforcement method.
Does this meet the goal?
You administer a Windows 8.1 Pro computer. The computer has File History turned on, and system protection turned on for drive C.
You accidentally delete a folder named Libraries\Customers by using the Shift+Delete keyboard shortcut.
You need to restore the most recent version of the folder to its original location.
Which approach should you use to restore the folder?
A. Recycle Bin
B. The latest restore point
C. File History
D. A manually selected restore point
You administer Windows 8.1 laptops. The laptops are configured to connect to an unsecured wireless access point.
You plan to configure the wireless access point to encrypt wireless traffic and turn off SSID broadcast.
You need to ensure the laptops will join the secured wireless network automatically after the configuration changes.
What should you do?
A. Set Network Discovery to Enabled for the Public profile.
B. Create an ad hoc network.
C. Set the Unidentified Networks Properties User permissions to User can change location.
D. Create a network profile.
Your network contains an Active Directory domain named contoso.com. All client computers run either Windows 7 or Windows 8. Some users work from customer locations, hotels, and remote sites. The remote sites often have firewalls that limit connectivity to the Internet.
You need to recommend a VPN solution for the users.
Which protocol should you include in the recommendation?
Your company has a main office, ten regional datacenters; and 100 branch offices.
You are designing the site topology for an Active Directory forest named contoso.com.
The forest will contain the following servers:
– In each regional datacenter and in the main office, a domain controller that runs Windows Server
– In each branch office, a file server that runs Windows Server 2012
You have a shared folder that is accessed by using the path \\contoso.com\shares\software.
The folder will be replicated to a local file server in each branch office by using Distributed File System (DFS) replication.
You need to recommend an Active Directory site design to meet the following requirements:
– Ensure that users in the branch offices will be authenticated by a domain controller in the closest regional datacenter.
– Ensure that users automatically connect to the closest file server when they access \\contoso.com\shares\software.
How many Active Directory sites should you recommend?
You must have a domain controller in each site (if the site contains users that need to log in to the domain).
You connect a portable Windows 8.1 computer to a corporate network by using a VPN connection.
You are unable to access websites on the Internet only when you are using the VPN connection.
You need to ensure that you can access websites when connected to the corporate network.
What should you do?
A. Configure the VPN connection to use only L2TP/IPSec.
B. In the TCP/IPv4 properties of the VPN connection, disable the Use default gateway on remote
C. Configure the VPN connection to use only PPTP.
D. In the TCP/IPv4 properties of the VPN connection, enable the Use default gateway on remote
E. In the TCP/IPv4 properties of the local area connection, disable the Automatic metric setting.
A company has a Microsoft Software Assurance with Volume Licensing agreement. All client computers run Windows 8.1.
An employee updates a device driver on his computer and then restarts the computer. Windows does not start successfully. You establish that the updated driver is the cause of the problem.
You need to prevent the updated driver from running on startup, without impacting other drivers or personal data.
What should you do?
A. Use the Windows 8.1 PC Reset feature.
B. Reset the computer to the manufacturer’s system image.
C. Start the computer with the Diagnostic and Recovery Toolset and configure the driver options.
D. Use the File History feature.