-
Which of the following options describes Segment Shrink?()
A . Reclaims space above and below the high-water mark without using additional space
B . Moves rows to a new physical location,resetting the high-water mark,but uses additional space during the operation
C . Deallocates space above the high-water mark that is currently not in use
D . None of the above
-
Which statement describes the ROWID data type? ()
A . Binary data up to 4 gigabytes.
B . Character data up to 4 gigabytes.
C . Raw binary data of variable length up to 2 gigabytes.
D . Binary data stored in an external file, up to 4 gigabytes.
E . A hexadecimal string representing the unique address of a row in its table.
-
Which two statements best describe EtherChannel?()
A . EtherChannel technology helps aggregate traffic grouping multiple,full-duplex point-to-point linkstogether
B . EtherChannel technology is based on the 802.1 IEEE stand
C . EtherChannel can aggregate up to 800 Mbps,8 Gbps,or Gbps of aggregate bandwidth for a Fast EtherChannel,Gigabit EtherChannel,or 10 Gigabit EtherChannel connection respectively
D . EtherChannel is defined for Rapid Spanning Tree for faster convergence
-
Which of these statements best describes VPLS?()
A . Neither broadcast nor multicast traffic is ever flooded in VPLS.
B . Multicast traffic is flooded but broadcast traffic is not flooded in VPLS.
C . VPLS emulates an Ethernet switch, with each EMS being analogous to a VLAN.
D . Because U-PE devices act as IEEE 802.1 devices, the VPLS core must use STP.
E . When the provider experiences an outage, IP re-routing restores PW connectivity and MAC re-learning is needed.
-
Which statement best describes echo?()
A . Echo is the discernable leak-through of your own Rx path into your own Tx path.
B . Echo is the discernable leak-through of the packets of your Rx path into your own Tx path.
C . Echo is the nonaudible leak-through of the packets of your Rx path into your own Tx path.
D . Echo is the audible leak-through of the packets from the transmit path into your own receive path.
E . Echo is the nonaudible leak-through of the packets of your Tx path into your own Rx path.
-
Which two statements correctly describe VTP?()
A . Transparent mode always has a configuration revision number of 0.
B . Transparent mode cannot modify a VLAN database.
C . Client mode cannot forward received VTP advertisements.
D . Client mode synchronizes its VLAN database from VTP advertisements.
E . Server mode can synchronize across VTP domains.
-
The OSPF External LSA for prefix x.x.x.x exists in the OSPF database, but the prefix is not installed in therouting table. Which are possible explanations?()
A . Inbound distribute-list is configured under the ospf process and it is denying x.x.x.x
B . ASBR origination the LSA is not reachable
C . Route to the Forwarding Address in not an internal OSPF route
D . Route to the Forwarding Address is an internal OSPF route
E . Route to the ASBR does not follow the same path as the one to the Forwarding Addre
-
Which two statements describe traffic policing?()
A . Traffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of data
B . Excess traffic is buffered so that the traffic remains within the desired rate.
C . Packets that conform to traffic policies are not delayed.
D . Packet marking is available and allows excess packets to be re-marked with a lower priorit
-
Which two statements best describe CBWFQ?()
A . The CBWFQ scheduler provides a guaranteed minimum amount of bandwidth to each class.
B . CBWFQ services each class queue using a strict priority scheduler.
C . The class-default queue only supports WFQ.
D . Inside a class queue, processing is always FIFO, except for the class-default queue.
-
Which two statements accurately describe a role?()
A . A role can be given to a maximum of 1000 users.
B . A user can have access to a maximum of 10 roles.
C . A role can have a maximum of 100 privileges contained in it.
D . Privileges are given to a role by using the CREATE ROLE statement.
E . A role is a named group of related privileges that can be granted to the user.
F . A user can have access to several roles, and several users can be assigned the same role.
-
Which statement describes the Authentication Proxy feature?()
A . All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
B . A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
C . Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
D . The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.
-
Which statements describe the routing protocol OSPF?()
A . It supports VLSM.
B . It is used to route between autonomous systems.
C . It confines network instability to one area of the network.
D . It increases routing overhead on the network.
E . It allows extensive control of routing updates.
F . It is simpler to configure than RIP v2.
-
Which best describes an inline view? ()
A . a schema object
B . a subquery that can contain an ORDER BY clause
C . another name for a view that contains group functions
D . a subquery that is part of the FROM clause of another query
-
Which of the following describe router functions?()
A . Packet switching
B . Collision prevention on a LAN segment
C . Packet filtering
D . Broadcast domain enlargement
E . Broadcast forwarding
F . Internetwork communicatio
-
Which statements describe the routing protocol OSPF?()
A . It supports VLSM.
B . It is used to route between autonomous systems.
C . It confines network instability to one area of the network.
D . It increases routing overhead on the network.
E . It allows extensive control of routing updates.
F . It is simpler to configure than RIP v2.
-
Which of these statements best describes VPLS?()
A . Neither broadcast nor multicast traffic is ever flooded in VPLS.
B . Multicast traffic is flooded but broadcast traffic is not flooded in VPLS.
C . VPLS emulates an Ethernet switch, with eachEMS being analogous to a VLAN.
D . Because U-PE devices act as IEEE 802.1 devices, the VPLS core must use STP.
E . When the provider experiences an outage, IP re-routing restores PW connectivity and MAC relearning is needed.
-
Which statement describes Reverse Route Injection (RRI)?()
A . A static route that points towards the Cisco Easy VPN server is created on the remote client.
B . A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.
C . A default route is injected into the route table of the remote client.
D . A default route is injected into the route table of the Cisco Easy VPN server.
-
Which of the following CANNOT describe multiculturalism?
-
Which is not right for the explanation of the relationship between Tristan and the bear?
-
Which of the following is a motivational explanation for why people believe strange things, as opposed to a cognitive explanation? 与认知解释相对的,以下哪条属于人们相信奇怪事件的动机解释?
-
If a company's current ratio declined in a year during which its quick ratio improved, which of the following is the: most likely explanation?______.
A.Inventory is declining
B.Inventory is increasing
C.Receivables are: being collected more rapidly than in the past
D.Receivables are being collected more slowly than in the past
-
Which sentence best describes Hank's ear?
A.it was nice and big.
B.It was new and red.
C.It was nice, new and red.
-
Which is the best explanation of the relationship between lymph, blood plasma, and interstitial fluid?
A.Blood plasma leaves blood vessels and becomes lymph surrounding cells. Cells can take in what they need and excrete wastes into this flui
D.Then the extra lymph enters lymphatic vessels and is called interstitial fluid and is returned to the blooD
B.Lymph leaves blood vessels and because blood plasma surrounding cells. Cells can take in what they need and excrete wastes into this flui
D.Then the extra blood plasma enters lymphatic vessels and is called interstitial fluid and is returned to the blooD
C.Interstitial fluid leaves blood vessels and becomes lymph surrounding cells.Cells can take in what they need and excrete wastes into this flui
D.Then the extra lymph enters lymphatic vessels and is called blood plasma and is returned to the bloo
D.Blood plasma leaves blood vessels and becomes interstitial flui
D.Cells can take in what they need and excrete wastes into this flui
D.Then the extra interstitial fluid enters lymphatic vessels and is called lymph and is returned to the bloo
D.
-
Which best describes the author’s tone()
A.Humanistic
B.Objective
C.Speculative
D.Recriminatory