-
Which two of these are correct regarding access control lists? (Choose two.) ()
A . An ACL can be applied to multiple interlaces.
B . An ACL wildcard mask is identical to an IP subnet mask.
C . There may be multiple ACLs per protocol, per direction, and per interface.
D . There is an "implicit deny" at the end of an ACL and will result in a dropped packet.
E . An ACL acts on all packets, those flowing thru the router and those originated by the router itself.
F . An ACL will be processed from top to bottom and may have multiple matches that will act on the packet that is being tested.
-
Which two operations require undo data?()
A . committing a transaction
B . rolling back a transaction
C . recovering from failed transactions
D . recording a transaction to redo log files
E . rolling forward during instance recovery
-
Which two statements are correct about database transportation?() (Choose two.)
A . The source and target platforms must be the same
B . Redo logs, control files and temp files are also transported
C . The transported database must have the same database identifier (DBID) as the source database and cannot be changed
D . The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transported
E . Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format
-
Which two statements are true about encrypting RMAN backup?() (Choose two.)
A . The transparent encryption of backups uses the encryption wallet
B . The database uses the same encryption key for every encrypted backup
C . The password encryption of backups only uses the password while creating and restoring backup
D . If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
-
Which two are the prerequisites to enable Flashback Data Archive?() (Choose two.)
A . Database must be running in archivelog mode.
B . Automatic undo management must be enabled.
C . Undo retention guarantee must be enabled.
D . The tablespace on which the Flashback Data Archive is created must be managed with Automatic Segment Space Management (ASSM).
-
Which two are equivalent? ()
A . 16>4
B . 16/2
C . 16*4
D . 16>>2
E . 16/2^2
F . 16>>>2
-
Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()
A . 802.1X
B . Cisco Temporal Key Integrity Protocol (CKIP)
C . Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)
D . Cisco Message Integrity Check (CMIC)
E . One-Time Passwords (OTP)
F . Advanced Encryption Standard (AES)
-
Which two are equivalent?()
A . 3/2
B . 3<2
C . 3*4
D . 3<<2
E . 3*2^2
F . 3<<<2
-
Which two are equivalent?()
A . 3/2
B . 3<2
C . 3*4
D . 3<<2
E . 3*2^2
F . 3<<<2
-
Which two client requests are captured during database replay Capture?() (Choose two)
A . Flashback queries
B . Shared server requests
C . Login and logoff activities of sessions
D . Direct path load of data from external files by using utilities such as SQL *loader
E . Data definition language (DDL) and data manipulation language (DML) operatio
-
Which two statements are true about network voice traffic? (Choose two.)()
A . Voice traffic is affected more by link speed than FTP traffic is.
B . Voice traffic is affected more by packet delays than FTP traffic is.
C . Voice streams involve larger packet sizes than most TCP network traffic involves.
D . Voice traffic is more sensitive to packet loss than TCP network traffic is.
E . Voice traffic requires QOS mechanisms only in heavily loaded network segments.
-
Which two statements are true?()
A . It is possible for more than two threads to deadlock at once.
B . The JVM implementation guarantees that multiple threads cannot enter into a deadlocked state.
C . Deadlocked threads release once their sleep() method’s sleep duration has expired.
D . Deadlocking can occur only when the wait(), notify(), and notifyAll() methods are used incorrectly.
E . It is possible for a single-threaded application to deadlock if synchronized blocks are used incorrectly.
F . If a piece of code is capable of deadlocking, you cannot eliminate the possibility ofdeadlocking by insertinginvocations of Thread.yield().
-
Which two choices are equivalent?()
A . 16 > 4
B . 16 / 2
C . 16 * 4
D . 16 >> 2
E . 16 / 22
F . 16 >>> 2
-
Which two multicast protocol statements are true? (Choose two.) ()
A . Dense mode multicast requires explicit join messages from their members.
B . Dense mode multicast uses a push model to flood traffic throughout the network and then prunes the unwanted traffic.
C . Sparse mode multicast uses a pull model to send multicast traffic to where it is requested.
D . Sparse mode uses reverse path forwarding (RPF) to prune off redundant flows.
E . The primary use of sparse mode multicast is for test labs and router performance testing.
-
Which are the two options to which a menu can be assigned?() (Choose two.)
A . menu
B . functions
C . data group
D . responsibility
E . functional grou
-
Which two are true?()
A . An encapsulated, public class promotes re-use.
B . Classes that share the same interface are always tightly encapsulated.
C . An encapsulated class allows subclasses to overload methods, but does NOT allow overriding methods.
D . An encapsulated class allows a programmer to change an implementation without affecting outside code.
-
Which two statemets are true?()
A . DPT/RPR uses a bi-directional ring consisting of two symmetric counter rotating fibre rings.
B . DPT/RPR is defined in the IEEE 802.17 standard and it uses Token Bucket system to avoid collisions on the fiber.
C . In DPT/RPR rings, data packets can be sent in one direction (downstream) and the corresponding control packets in the opposite direction (upstream),thus using both fibres concurrently to maximise bandwidth.
D . DPT/RPR can be deployed in the Core of the SP networks where point-to-point POS links are used tomake best use of the Bandwidth.
-
Which two of these statements best describe fast secure roaming? (Choose two.)()
A . available only in autonomous APs
B . available in autonomous and lightweight APs
C . a feature of WDS in autonomous APs
D . a feature of WDS in lightweight APs
E . requires at least one AP and one Wireless LAN Services Module
-
Which two statements are true?()
A . It is possible for more than two threads to deadlock at once.
B . The JVM implementation guarantees that multiple threads cannot enter into a deadlocked state.
C . Deadlocked threads release once their sleep() method's sleep duration has expired.
D . Deadlocking can occur only when the wait(), notify(), and notifyAll() methods are used incorrectly.
E . It is possible for a single-threaded application to deadlock if synchronized blocks are used incorrectly.
F . If a piece of code is capable of deadlocking, you cannot eliminate the possibility of deadlocking by inserting invocations of Thread.yield().
-
Which two statements are true regarding ownership of shared entities? ()(Choose two.)
A . Customers is owned by Oracle Human Resources whereas Locations is owned by Oracle Receivables.
B . Items is owned by Oracle Purchasing whereas Locations is owned by Oracle Receivables.
C . Sales Force is owned by Oracle Order Management whereas Employees is owned by Oracle Human Resources.
D . Set of books is owned by Oracle General Ledger whereas Locations is owned by Oracle Human Resources.
E . Suppliers is owned by Oracle Purchasing whereas Units of Measure is owned by Oracle Inventory.
-
Which two are true?()
A . A finalizer may NOT be invoked explicitly.
B . The finalize method declared in class Object takes no action.
C . super.finalize()is called implicitly by any over riding finalize method.
D . The finalize method for a given objec twill be called no more than once by the garbage collector.
E . The order in which finalize will be called on two objects is based on the order in which the two objects became finalizable.
-
Which two statements are true about a job chain? ()(Choose two.)
A . A job chain can contain a nested chain of jobs.
B . The jobs in a job chain cannot have more than one dependency.
C . A job of the CHAIN type can be run using event-based or time-based schedules.
D . The jobs in a job chain can be executed only by using the events generated by the Scheduler
-
Explain two ways in which public speaking and conversation differ, and two ways in which they are similar.
-
Which two statements are correct? Choose two answers.