-
When using Cisco Network Assistant to configure a WS-CE500-24LC switch, which three are available choices in the port settings window?()
A . Duplex mode selections
B . Auto MDIX selections
C . Status Selections
D . Group mode selections
E . Port security selectio
-
Which three are used in configuring Call Manager dial plans? ()
A . route list
B . route group
C . gateway list
D . route patter
-
Which three Server Pool Qualifications are used in the Cisco UCS manager?()
A . firmware
B . CPU
C . memory
D . adapter card
-
The InnoDB engine has a feature known as clustered indexes. Which three statements are true about clustered indexes as used in InnoDB?()
A . A primary key must exist for creation of a clustered index
B . A clustered index allows fulltext searching within InnoDB
C . The first unique index is always used as a clustered index and not a primary key
D . A clustered index provides direct access to a page containing row data
E . If no indexes exist, a hidden clustered index is generated based on row IDs
F . A primary key is used as a clustered index
G . A clustered index is a grouping of indexes from different tables into a global index for faster searching
-
To use Active Cache features in WebLogic 12C, which three libraries are needed from the WebLogic Server installation to be deployed in WebLogic Server?()
A . coherence-work.jar
B . coherence.jar
C . active-cache-1.0.jar
D . coherence-web-spi.war
-
Which three technologies are used to reduce chromatic dispersion accumulation in fiber-optic transmission systems?()
A . PIN photodiodes
B . zero-chirped lasers
C . Erbium-doped fiber amplifiers
D . dispersion compensating fiber
E . dispersion compensating Bragg grating
-
Which three port states are used by RSTP 802.1w? ()
A . Listening
B . Learning
C . Forwarding
D . Blocking
E . Discarding
F . Disabled
-
Which three actions are allowed in event details? ()(Choose three.)
A . Send
B . Raise
C . Delete
D . Receive
E . Acknowledge
-
You are using Recovery Manager (RMAN) to perform backups. In which three situations would you perform a compressed backup?()
A . You are backing up to tape and your tape device performs its own compression.
B . You are making image copies, and you have not enabled tablespace compression.
C . You are using disk-based backups and disk space in your Flash Recovery Area, or other disk-based backup destinations are limited.
D . You are performing your backups to some device over a network where reduced network bandwidth is more important than CPU usage.
E . You are using some archival backup media, such as CD or DVD, where reducing backup sizes saves media costs and archival storage.
-
Which three colors are used in the Cisco WCS v5.2 Voice Readiness Tool?()
A . green
B . blue
C . yellow
D . red
E . purple
F . white
-
Which three features are benefits of using GRE tunnels in conjunction with IPsec for building site-to-site VPNs?()
A . allows dynamic routing over the tunnel
B . supports multi-protocol (non-IP) traffic over the tunnel
C . reduces IPsec headers overhead since tunnel mode is used
D . simplifies the ACL used in the crypto map
E . uses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuratio
-
Which three statements are true about using flashback database in a multitenant container database(CDB)?()
A . The root container can be flashed back without flashing back the pluggable databases (PDBs).
B . To enable flashback database, the CDB must be mounted.
C . Individual PDBs can be flashed back without flashing back the entire cdb.
D . The DB_FLASHBACK RETENTION_TARGET parameter must be set to enable flashback of the cdb.
E . A CDB can be flashed back specifying the desired target point in time or an SCN, but not a restore point.
-
You need to determine the correct wireless LAN topology for use in the Company network. Which three statements are true about the various WLAN topologies?()
A . In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
B . In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single access point for connecting to each other or to wired network resources.
C . In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS).
D . In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
E . In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single AP for connecting to each other or to wired network resources.
F . In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS)
-
What are three functions of the Cisco wireless LAN controller, which is being used in the Company Centralized WLAN solution network? ()
A . Authentication
B . Mobility
C . Security management
D . Transmission of beacon frames
E . Real-time portions of MAC management
F . Real-time aspects of the 802.11 prtocol management
G . SNMP collectio
-
Which three port states are used by RSTP 802.1w?()
A . Listening
B . Learning
C . Forwarding
D . Blocking
E . Discarding
F . Disabled
-
You plan to use the In Database Archiving feature of Oracle Database 12c, and store rows that are inactive for over three months, in Hybrid Columnar Compressed (HCC) format. Which three storage options support the use of HCC?()
A . ASM disk groups with ASM disks consisting of Exadata Grid Disks.
B . ASM disk groups with ASM disks consisting of LUNS on any Storage Area Network array
C . ASM disk groups with ASM disks consisting of any zero padded NFS-mounted files
D . Database files stored in ZFS and accessed using conventional NFS mounts.
E . Database files stored in ZFS and accessed using the Oracle Direct NFS feature
F . Database files stored in any file system and accessed using the Oracle Direct NFS feature
G . ASM disk groups with ASM disks consisting of LUNs on Pillar Axiom Storage array
-
pany is implementing 802.1X in order to increase network security. In the use of 802.1X access control, which three protocols are allowed through the switch port before authentication takes place? ()
A . EAP-over-LAN
B . EAP MD5
C . STP
D . protocols not filtered by an ACL
E . CDP
F . TACACS+
-
Which three statements are true about implementing wireless LANs in the network using Ciscodevices?()
A . Antenna power is a relative value reference to dBi
B . LWAPP allows encrypted communications between lightweight access points and WLANcontrollers.
C . Characteristics of antennas are directionality, gain, and polarization
D . Power over Ethernet (PoE) is only available when a WLAN controller is integrated into thenetwork
E . The WLAN solution Engine (WLSE) is used to control lightweight access points
F . One of the advantages of the lightweight WLAN solution is that the devices act indepently
-
Which three choices are BGP Extended communities used in MPLS-VPN deployment?()
A . Site Of Origin SOO
B . Route-Target
C . Route-Distinguisher
D . Domain Identifier BGP extended commumity
-
Which three technologies are used to reduce chromatic dispersion accumulation in fiber-optic transmission systems? ()(Choose three.)
A . PIN photodiodes
B . zero-chirped lasers
C . Erbium-doped fiber amplifiers
D . dispersion compensating fiber
E . dispersion compensating Bragg grating
-
You want to make use of the object features available in the database for the form module you are developing. Which three statements about object types are true? ()
A . An object type is a user-defined composite data type.
B . The attributes of an object type can be those of other object types.
C . A PL/SQL table of records is an example of a nested object type.
D . An object type must be declared as a type before the actual object itself can be declared.
-
Which three are true regarding the use of outer joins?()
A . You cannot use IN operator in a condition that involves an outerjoin.
B . You use (+) on both sides of the WHERE condition to perform an outerjoin.
C . You use (*) on both sides of the WHERE condition to perform an outerjoin.
D . You use an outerjoin to see only the rows that do not meet the join condition.
E . In the WHERE condition, you use (+) following the name of the column in the table without matching rows, to perform an outerjoin.
F . You cannot link a condition that is involved in an outerjoin to another condition by using the OR operator.
-
If you are going to give speeches on the following three topics, in which speech will you use problem-solution order?
-
There are many different ways of presenting grammar in the classroom. Among them, three are most frequently used and discussed. Which one does not be|ong to them?
A、The deductive method.
B、The inductive method.
C、The guided discovery method.
D、The productive method.