-
What are three IPv6 transition mechanisms?()
A . 6to4 tunneling
B . VPN tunneling
C . GRE tunneling
D . ISATAP tunneling
E . PPP tunneling
F . Teredo tunneling
-
Which three QoS mechanisms can be configured to improve VoIP quality on a converged network?()
A . The use of a queuing method that will give VoIP traffic strict priority over other traffic
B . The use of RTP header compression for the VoIP traffic.
C . The proper classification and marking of the traffic as close to the source as possible
D . The use of 802.1QinQ trunking for VoIP traffic
E . The use of WRED for the VoIP traffic
-
Which three are advantages of SONET?()
A . Allows the transportation of all forms of traffic
B . Multiplexing is easy
C . Clocks do not need to be synchronized
D . Reduces network complexity and cost
E . Padding is not necessary and not permitted
-
Which three statements are true?()
A . A final method in class X can be abstract if and only if X is abstract.
B . A protected method in class X can be overridden by any subclass of X.
C . A private static method can be called only within other static methods in class X.
D . A non-static public final method in class X can be overridden in any subclass of X.
E . A public static method in class X can be called by a subclass of X without explicitly referencing the class X.
F . A method with the same signature as a private final method in class X can be implemented in a subclass of X.
G . A protected method in class X can be overridden by a subclass of X only if the subclass is in the same package as X.
-
Which three are Cisco architectures?()
A . cloud computing
B . consumerization
C . collaboration
D . virtualization
E . digital media
F . borderless network
-
Which three statements are true about persistent configuration?() (Choose three.)
A . A user cannot set privileges on the persistent lightweight jobs
B . Persistent lightweight jobs generate a large amount of metadata
C . It is possible to create fully self-contained persistent lightweight jobs
D . The use of a template is mandatory to create persistent lightweight jobs
E . Persistent lightweight jobs are useful when users need to create a large number of jobs in a short time
-
Which three statements are true?()
A . The default constructor initializes method variables.
B . The default constructor has the same access as its class.
C . The default constructor invoked the no-arg constructor of the superclass.
D . If a class lacks a no-arg constructor, the compiler always creates a default constructor.
E . The compiler creates a default constructor only when there are no other constructors for the class.
-
What are three problems with the tail drop mechanism of managing interface congestion?()
A . Queuing introduces equal delays for packets of the same flow, resulting in jitter.
B . When congestion occurs, dropping affects most of the TCP sessions, which simultaneously back off and then restart again.
C . All buffers can temporarily be seized by aggressive flows, and normal TCP flows experience buffer starvation.
D . There is no differentiated drop mechanism. Higher priority traffic is dropped in the same way as best-effort traffic.
E . In TCP starvation, traffic exceeds the queue limit because of the bursty nature of packet networks. A router cannot handle multiple concurrent TCP sessions.
F . Global synchronization occurs because multiple TCP hosts reduce their transmission rates at random intervals in response to packet dropping
-
What are three IPv6 transition mechanisms?()
A . 6to4 tunneling
B . VPN tunneling
C . GRE tunneling
D . ISATAP tunneling
E . PPP tunneling
F . Teredo tunneling
-
Which three are true? ()
A . A MERGE statement is used to merge the data of one table with data from another.
B . A MERGE statement replaces the data of one table with that of another.
C . A MERGE statement can be used to insert new rows into a table.
D . A MERGE statement can be used to update existing rows in a table.
-
Which three actions are allowed in event details? ()(Choose three.)
A . Send
B . Raise
C . Delete
D . Receive
E . Acknowledge
-
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()
A . the two methods of authentication using the WEP encryption are open and shared key
B . the 802.11 standard defines WEP security using 128-bit keys
C . WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
D . WEP is a scalable encryption solution that uses static keys for authentication
E . WEP security provides only one-way authentication
F . WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism
-
Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
A . CHAP uses a two-way handshake
B . CHAP authentication periodically occurs after link establishment
C . CHAP has no protection from playback attacks
D . CHAP authentication is performed only upon link establishment
E . CHAP uses a three-way handshake
F . CHAP authentication passwords are sent in plaintext
-
Which two statements about queuing mechanisms are true? ()
A . FIFO queuing is only appropriate for slower serial interfaces
B . weighted fair queuing is the default queuing mechanism used for all but slower than E1 rate interfaces
C . only one queuing mechanism type can be applied to an interface
D . weighted fair queuing does not require the configuration of access lists to classify traffic
E . flow-based weighted fair queuing provides for queues to be serviced in a round-robin fashio
-
Which three of these items are IPv6 transition mechanisms? ()(Choose three.)
A . ISATAP
B . NATV6
C . manually configured overlay tunnels
D . dual stack configuratio
-
Which three WLAN statements are true? (Choose three.) ()
A . A lightweight AP receives control and configuration from a WLAN controller to which it is associated.
B . A WLAN client that is operating in half-duplex mode will delay all clients in that WLAN
C . A dhoc mode allows mobile clients to connect directly without an intermediate AP
D . Another term for infrastructure mode is independent service set (IBSS)
E . The Aironet 1230 access point is an example of an access point that operates solely as a lightweight access point.
F . WLANs are designed to share the medium and can easily handle an increased demand of channel contention.
-
You are creating a new JSP page and you need to execute some code that acts when the page is firstexecuted, but only once. Which three are possible mechanisms for performing this initialization code?()
A . In the init method.
B . In the jspInit method.
C . In the constructor of the JSP’s Java code.
D . In a JSP declaration, which includes an initializer block.
E . In a JSP declaration, which includes a static initializer block.
-
Which of the following are components of a mechanical seal? () (1) stationary ring (2) rotational ring (3) packing (4)spring
A . (1), (2) and (3)
B . (1), (2) and (4)
C . (2), (3) and (4)
D . None of the above
-
Which three options are supported as address allocation mechanisms for DHCP on Cisco routers?()
A . The IP address can be automatically assigned to a host.
B . The IP address can be assigned as a random hash value of the burned - in - address of the lowest - numbered LAN interface on the router.
C . The network administrator can assign a speci fic IP address to a specific host MAC address.
D . The IP address can be assigned from configured pools in a reverse lexicographical order.
E . The IP address can be assigned to a host for a limited time or until the host explicitly releases the address.
F . The IP address can be assigned to a host until the host usurps the assigned value using its own dynamic override mechanism.
-
Among the basic categories of equipment, which of the following are used to convert mechanical into hydraulic energy?()
A . The hydraulic pumps
B . Valves
C . Hydraulic cylinders
D . Hydraulic motor
-
Mechanical lubricators for diesel engine cylinders are usually small reciprocating pumps which are ().
A . operated manually once an hour
B . operated until the engine has started
C . placed into operation only at maximum load
D . adjustable to meet lubrication requirement
-
Which three MPLS statements are true?()
A . Cisco Express Forwarding (CEF) must be enabled as a prerequisite to running MPLS on a Cisco router.
B . Frame-mode MPLS inserts a 32-bit label between the Layer 3 and Layer 4 headers.
C . MPLS is designed for use with frame-based Layer 2 encapsulation protocols such as Frame Relay, but is not supported by ATM because of ATM fixed-length cells.
D . OSPF, EIGRP, IS-IS, RIP, and BGP can be used in the control plane.
E . The control plane is responsible for forwarding packets.
F . The two major components of MPLS include the control plane and the data plane.
-
Which three mechanisms are used to secure management traffic from outside IPS sensors?()
A . secure tunnels
B . a separate management VLAN
C . secure VLANs to isolate sensors
D . an out-of-band path around the firewall
E . asymmetric traffic flows to isolate sensors
F . private VLANs to put all sensors on isolated port