-
Which two of these are correct regarding access control lists? (Choose two.) ()
A . An ACL can be applied to multiple interlaces.
B . An ACL wildcard mask is identical to an IP subnet mask.
C . There may be multiple ACLs per protocol, per direction, and per interface.
D . There is an "implicit deny" at the end of an ACL and will result in a dropped packet.
E . An ACL acts on all packets, those flowing thru the router and those originated by the router itself.
F . An ACL will be processed from top to bottom and may have multiple matches that will act on the packet that is being tested.
-
Which two statements about zoning are correct? ()
A . Zoning increases security.
B . DNS queries are used for software zoning.
C . Software zoning is more secure than hardware zoning.
D . When using zones and VSANs together, the zone is created first.
E . Zoning requires that VSANs be established before it becomes operational.
-
Which two commands correctly verify whether port security has been configured on portFastEthernet 0/12on a switch?()
A . SW1#show swithport port-security interface FastEthernet 0/12
B . SW1# show swithport port-secure interface FastEthernet 0/12
C . SW1# show port-secure interface FastEthernet 0/12
D . SW1#show running-config
-
Which two statements are correct about the aaa authentication login default grouptacacs+ localglobal configuration command? ()
A . this login authenticationmethod list is automaticallyapplied to all lines except those that have a named method list explicitly defined
B . If the user fails the TACACS+ authentication then the local database on the router will be used to authenticatethe user
C . if the tacacs+ server fails to respond then the local database on the router will be used to authenticate the user
D . "login" is the name of the method list being configured
E . if the tacacs+ server is unavailable, authentication will succeed automaticallyby default
-
Which two statements are correct about database transportation?() (Choose two.)
A . The source and target platforms must be the same
B . Redo logs, control files and temp files are also transported
C . The transported database must have the same database identifier (DBID) as the source database and cannot be changed
D . The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transported
E . Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format
-
Which two statements are correct about database transportation? ()
A . The source and target platforms must be the same
B . Redo logs, control files and temp files are also transported
C . The transported database must have the same database identifier (DBID) as the source database and cannot be changed
D . The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transported
E . Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format
-
Which two statements about an interface configured with the asr-group command are correct?()
A . The FWSM supports up to 16 asymmetric routing groups.
B . If a matching packet is not found, the packet is dropped.
C . Asymetric routing of return traffic is enabled.
D . If a matching packet is found, the Layer 3 header is rewritten.
E . If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.
-
Which two statements are correct regarding Flex Links? ()
A . An interface can belong to multiple Flex Links.
B . Flex Links operate only over single pairs of links.
C . Flex Link pairs must be of the same interface type
D . Flex Links automatically disable STP so no BPDUs are propagated
E . Failover from active to standby on Flex Links takes less than a second
-
Which two of these correctly describe Fibre Channel? ()
A . supports multiple protocols
B . works only in a shared or loop environment
C . allows addressing for up to 4 million nodes
D . allows addressing for up to 8 million nodes
E . provides a high speed transport for SCSI payloads
F . may stretch to a distance of up to100 km before needing extender
-
You executed the following command to drop a user: DROP USER scott CASCADE; Which two statements regarding the above command are correct?()
A . All the objects of scott are moved to the Recycle Bin.
B . Any objects in the Recycle Bin belonging to scott are purged.
C . All the objects owned by scott are permanently dropped from the database.
D . All the objects of scott in the Recycle Bin must be purged before executing the DROP command.
E . Any objects in the Recycle Bin belonging to scott will not be affected by the above DROP command.
-
Evaluate the following command and its output: SQL>SELECT * FROM dba_temp_free_space; TABLESPACE_NAME TABLESPACE_SIZE ALLOCATED_SPACE FREE_SPACE LMTEMP 250609664 101048576 149561088 Which two statements correctly interpret the output?()
A . FREE_SPACE indicates only the space that is currently unallocated.
B . ALLOCATED_SPACE indicates only the space currently allocated and in use.
C . FREE_SPACE indicates only the space that is currently allocated and available for reuse.
D . ALLOCATED_SPACE indicates both the space currently allocated and used,and the space that is available for reuse.
E . FREE_SPACE indicates both the space that is currently allocated and available for reuse,and the space that is currently unallocated.
-
Which two statements about zoning are correct?()
A . Zoning increases security.
B . DNS queries are used for software zoning.
C . Software zoning is more secure than hardware zoning.
D . When using zones and VSANs together, the zone is created first.
E . Zoning requires that VSANs be established before it becomes operational.
-
You executed the following FLASHBACK TABLE command: FLASHBACK TABLE emp TO TIMESTAMP (’11:45’,’hh12:mi’); Which two statements are correct?()
A . The FLASHBACK TABLE statement will not be written to the alert log file.
B . The changes made to the EMP table since the specified time will be undone.
C . The EMP table that was dropped by mistake from the database will be restored.
D . The FLASHBACK TABLE statement will be executed within a single transaction.
E . The FLASHBACK TABLE statement will not maintain the existing indexes on the EMP table.
F . The list of transactions that have modified the EMP table since the specified time will be displayed.
-
Which two statements correctly describe VTP?()
A . Transparent mode always has a configuration revision number of 0.
B . Transparent mode cannot modify a VLAN database.
C . Client mode cannot forward received VTP advertisements.
D . Client mode synchronizes its VLAN database from VTP advertisements.
E . Server mode can synchronize across VTP domains.
-
You executed the following command to drop a user: DROP USER scott CASCADE; Which two statements regarding the above command are correct?()
A . All the objects of scott are moved to the Recycle Bin.
B . Any objects in the Recycle Bin belonging to scott are purged.
C . All the objects owned by scott are permanently dropped from the database.
D . All the objects of scott in the Recycle Bin must be purged before executing the DROP command.
E . Any objects in the Recycle Bin belonging to scott will not be affected by the above DROP command.
-
Which two statements are correct about Nonstop Forwarding?()
A . It allows the standby RP to take control of the device after a hardware or software fault on the active RP.
B . It is a Layer 3 function that works with SSO to minimize the amount of time a network is unavailable tousers following a switchover.
C . It is supported by the implementation of EIGRP, OSPF, RIPv2, and BGP protocols.
D . It synchronizes startup configuration, startup variables, and running configuration.
E . The main objective of NSF is to continue forwarding IP packets following a switchover.
F . Layer 2 802.1w or 802.1s must be used, as 802.1d cannot process the Layer 2 changes.
G . Routing protocol tuning parameters must be the same as the NSF parameters, or failover will beinconsistent.
-
Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()
A . SW1#show swithport port-security interface FastEthernet 0/12
B . SW1# show swithport port-secure interface FastEthernet 0/12
C . SW1# show port-secure interface FastEthernet 0/12
D . SW1#show running-config
E . SW1#show port-security interface FastEthernet 0/12
-
Which two of these correctly describe Fibre Channel?()
A . supports multiple protocols
B . works only in a shared or loop environment
C . allows addressing for up to 4 million nodes
D . allows addressing for up to 8 million nodes
E . provides a high speed transport for SCSI payloads
F . may stretch to a distance of up to 100 km before needing extender
-
Evaluate the following command and its output:
https://assets.asklib.com/images/image2/2018080214105523041.jpg
Which two statements correctly interpret the output?()
A . FREE_SPACE indicates only the space that is currently unallocated.
B . ALLOCATED_SPACE indicates only the space currently allocated and in use.
C . FREE_SPACE indicates only the space that is currently allocated and available for reuse.
D . ALLOCATED_SPACE indicates both the space currently allocated and used, and the space that is available for reuse.
E . FREE_SPACE indicates both the space that is currently allocated and available for reuse, and the space that is currently unallocated.
-
Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()
A . SW1#show swithport port-security interface FastEthernet 0/12
B . SW1# show swithport port-secure interface FastEthernet 0/12
C . SW1# show port-secure interface FastEthernet 0/12
D . SW1#show running-config
E . SW1#show port-security interface FastEthernet 0/12
-
You executed the following FLASHBACK TABLE command: FLASHBACK TABLE emp TO TIMESTAMP (’11:45’,’hh12:mi’); Which two statements are correct? ()
A . The FLASHBACK TABLE statement will not be written to the alert log file.
B . The EMP table that was dropped by mistake from the database will be restored.
C . The changes made to the EMP table since the specified time will be undone.
D . The FLASHBACK TABLE statement will not maintain the existing indexes on the EMP table.
E . The FLASHBACK TABLE statement will be executed within a single transaction.
F . The list of transactions that have modified the EMP table since the specified time will be displayed.
-
Which two statements are correct about database transportation?()
A . The source and target platforms must be the same
B . Redo logs,control files and temp files are also transported
C . The transported database must have the same database identifier (DBID) as the source database and cannot be changed
D . The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transported
E . Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format
-
Which two statements are correct? Choose two answers.
-
Which MS-DOS command is correct?()
A.DEL /s *.bat
B.DEL *.exe/sp
C.DEL *.obj >nul:
D.DEL *.com *.sys