Which two are NOT characteristics of the OSPF routing protocol?()

A . It confines network instability to a single area of network. B . It increases the routing overhead of the network C . It supports VLSM D . It routes between Autonomous Systems. E . It allows extensive control of routing update

时间:2022-10-21 01:15:01 所属题库:CCNA(640-801)题库

相似题目

  • Which two statements are correct about database transportation?() (Choose two.)

    A . The source and target platforms must be the same B . Redo logs, control files and temp files are also transported C . The transported database must have the same database identifier (DBID) as the source database and cannot be changed D . The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transported E . Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format

  • Which two statements are true about encrypting RMAN backup?() (Choose two.)

    A . The transparent encryption of backups uses the encryption wallet B . The database uses the same encryption key for every encrypted backup C . The password encryption of backups only uses the password while creating and restoring backup D . If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.

  • Which two are characteristics of RSVP? ()

    A .  RSVP itself provides bandwidth and delay guarantees. B .  For RSVP to be end-to-end, all devices must support RSVP. C .  RSVP reservations are maintained by a centralized reservations server. D .  An RSVP compatible QoS mechanism must be used to implement guarantees according to RSVP reservations.

  • Which two are true about authentication?()

    A . Form-based logins should NOT be used with HTTPS. B . When using Basic Authentication the target server is NOT authenticated. C . J2EE compliant web containers are NOT required to support the HTTPS protocol. D . Web containers are required to support unauthenticated access to unprotected web resources.

  • Which two are equivalent? ()  

    A .  16>4 B .  16/2 C .  16*4 D .  16>>2 E .  16/2^2 F .  16>>>2

  • Which two are equivalent?() 

    A .  3/2 B .  3<2 C .  3*4 D .  3<<2 E .  3*2^2 F .  3<<<2

  • Which two are equivalent?()   

    A .  3/2 B .  3<2 C .  3*4 D .  3<<2 E .  3*2^2 F .  3<<<2

  • Which two are valid and equivalent?()

    A . <%! int i; %> B . <%= int i; %> C . <jsp:expr>int i;</jsp:expr> D . <jsp:scriptlet>int i;</jsp:scriptlet> E . <jsp:declaration>int i;</jsp:declaration&gt

  • Which two statements are true about network voice traffic? (Choose two.)()

    A .  Voice traffic is affected more by link speed than FTP traffic is. B .  Voice traffic is affected more by packet delays than FTP traffic is. C .  Voice streams involve larger packet sizes than most TCP network traffic involves. D .  Voice traffic is more sensitive to packet loss than TCP network traffic is. E .  Voice traffic requires QOS mechanisms only in heavily loaded network segments.

  • Which two statements are true?()

    A . It is possible for more than two threads to deadlock at once. B . The JVM implementation guarantees that multiple threads cannot enter into a deadlocked state. C . Deadlocked threads release once their sleep() method’s sleep duration has expired. D . Deadlocking can occur only when the wait(), notify(), and notifyAll() methods are used incorrectly. E . It is possible for a single-threaded application to deadlock if synchronized blocks are used incorrectly. F . If a piece of code is capable of deadlocking, you cannot eliminate the possibility ofdeadlocking by insertinginvocations of Thread.yield().

  • Which two choices are equivalent?()

    A .  16 > 4 B .  16 / 2 C .  16 * 4 D .  16 >> 2 E .  16 / 22 F .  16 >>> 2

  • Which two multicast protocol statements are true? (Choose two.)  ()

    A .  Dense mode multicast requires explicit join messages from their members. B .  Dense mode multicast uses a push model to flood traffic throughout the network and then prunes the  unwanted traffic. C .  Sparse mode multicast uses a pull model to send multicast traffic to where it is requested.   D .  Sparse mode uses reverse path forwarding (RPF) to prune off redundant flows. E .  The primary use of sparse mode multicast is for test labs and router performance testing.

  • Which are the two options to which a menu can be assigned?() (Choose two.)

    A . menu B . functions C . data group D . responsibility E . functional grou

  • Which two are characteristics of RSVP?()

    A . RSVP itself provides bandwidth and delay guarantees. B . For RSVP to be end-to-end, all devices must support RSVP. C . RSVP reservations are maintained by a centralized reservations server. D . An RSVP compatible QoS mechanism must be used to implement guarantees according to RSVP reservations.

  • Which two are true?()

    A .  An encapsulated, public class promotes re-use. B .  Classes that share the same interface are always tightly encapsulated. C .  An encapsulated class allows subclasses to overload methods, but does NOT allow overriding methods. D .  An encapsulated class allows a programmer to change an implementation without affecting outside code.

  • Two types of anchor shackles which are currently available are().

    A . U-Type and posilok shackles B . C-Type and wedge shackles C . D-Type and bow shackles D . wedge and kenter shackle

  • Which two statemets are true?()

    A . DPT/RPR uses a bi-directional ring consisting of two symmetric counter rotating fibre rings. B . DPT/RPR is defined in the IEEE 802.17 standard and it uses Token Bucket system to avoid collisions on the fiber. C . In DPT/RPR rings, data packets can be sent in one direction (downstream) and the corresponding control packets in the opposite direction (upstream),thus using both fibres concurrently to maximise bandwidth. D . DPT/RPR can be deployed in the Core of the SP networks where point-to-point POS links are used tomake best use of the Bandwidth.

  • When HSRP is configured on a network, which two of these items are provided, which are sharedbetween the routers that run HSRP? ()(Choose two.)

    A . TCP-based hello packets B . the impact of flapping links if timers are too low C . a shared single interface D . the ability to track serial interfaces E . UDP-based hello packet

  • Which two statements are true?()

    A . It is possible for more than two threads to deadlock at once. B . The JVM implementation guarantees that multiple threads cannot enter into a deadlocked state. C . Deadlocked threads release once their sleep() method's sleep duration has expired. D . Deadlocking can occur only when the wait(), notify(), and notifyAll() methods are used incorrectly. E . It is possible for a single-threaded application to deadlock if synchronized blocks are used incorrectly. F . If a piece of code is capable of deadlocking, you cannot eliminate the possibility of deadlocking by inserting invocations of Thread.yield().

  • Which two are true?()

    A . A finalizer may NOT be invoked explicitly. B . The finalize method declared in class Object takes no action. C . super.finalize()is called implicitly by any over riding finalize method. D . The finalize method for a given objec twill be called no more than once by the garbage collector. E . The order in which finalize will be called on two objects is based on the order in which the two objects became finalizable.

  • Which the two choices are equivalent?()

    A .  3 / 2 B .  3 < 2 C .  3 * 4 D .  3 << 2 E .  3 * 22 F .  3 <<<2

  • Which two statements are true about a job chain? ()(Choose two.)

    A . A job chain can contain a nested chain of jobs. B . The jobs in a job chain cannot have more than one dependency. C . A job of the CHAIN type can be run using event-based or time-based schedules. D . The jobs in a job chain can be executed only by using the events generated by the Scheduler

  • Which two of statements are true?()

    A . It is possible to synchronize static methods. B . When a thread has yielded as a result of yield(), it releases its locks. C . When a thread is sleeping as a result of sleep(), it releases its locks. D . The Object.wait() method can be invoked only from a synchronized context. E . The Thread.sleep() method can be invoked only from a synchronized context. F . When the thread scheduler receives a notify() request, and notifies a thread, that thread immediately releases its lock.

  • Which two statements are correct? Choose two answers.