-
Which four statements about NetFlow are true?()
A . NetFlow records bidirectional IP traffic flow.
B . NetFlow export can be implemented over IPv4.
C . NetFlow export can be implemented over IPv6.
D . NetFlow records multicast IP traffic flow.
E . NetFlow records ingress traffic.
F . NetFlow records egress traffic.
-
What are the four vPath packet flow steps? ()
A . perform flow lookups
B . intercept packets on service enabled ports
C . run packets through the vPath flow manager
D . classify the packets
E . flow manager emits an action for the packets
F . enforce the action determined by the flow manager
-
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()
A . EVC infrastructure is a Layer 3 platform-independent routing architecture that supports IP overEthernet services
B . Ethernet flow point (EFP) is configured on the main interface
C . Feature commands like MQC-based QoS policies can be specified
D . EVC infrastructure is a Layer 2 platform-independent bridging architecture that supports Ethernetservices
E . Each Ethernet flow point (EFP) matches a predefined VLAN tag-based criteria
F . Ethernet flow point (EFP) is configured on the VLAN interface
-
Which four of these are MPLS label header fields? ()
A . Label
B . VPI VCI
C . EXP
D . TTL
E . FCS
F . S flag
-
Which four statements are true?()
A . Has-a relationships should never be encapsulated.
B . Has-a relationships should be implemented using inheritance.
C . Has-a relationships can be implemented using instance variables.
D . Is-a relationships can be implemented using the extends keyword.
E . Is-a relationships can be implemented using the implements keyword.
F . An array or a collection can be used to implement a one-to-many has-a relationship.
-
Which four are true?()
A . Has-a relationships should never be encapsulated.
B . Has-a relationships should be implemented using inheritance.
C . Has-a relationships can be implemented using instance variables.
D . Is-a relationships can be implemented using the extends keyword.
E . Is-a relationships can be implemented using the implements keyword.
F . An array or a collection can be used to implement a one-to-many has-a relationship.
G . The relationship between Movie and Actress is an example of an is-a relationship.
-
Which four are valid Oracle constraint types? ()
A . CASCADE
B . UNIQUE
C . NONUNIQUE
D . CHECK
E . PRIMARY KEY
F . CONSTANT
G . NOT NULL
-
Which four are true regarding the Workspace Manager in Oracle9i? ()
A . Automatically versions all tables.
B . Automatically installed with Oracle9i.
C . Merges changes with parent rows or discard changes.
D . Provides mechanism to identify and resolve conflicts.
E . Allows for version enabling tables by use of a packages procedure.
-
Which of the following are prerequisite steps to transport a database?()
A . Query the V$TRANSPORTABLE_PLATFORMS view in the source database to determine if the intended destination is listed.
B . Verify that there are no restrictions or limitations that the source or destination database may encounter.
C . Verify that the source and destination have the same Oracle version critical updates,patch-set version,and patch- set exceptions.
D . Determine if you will perform the conversion on the source or destination platform.
E . None of the above.
-
Which four are types of functions available in SQL? ()
A . string
B . character
C . integer
D . calendar
E . numeric
F . translation
G . date
H . conversio
-
Which four are correct guidelines for naming database tables? ()
A . Must begin with either a number or a letter.
B . Must be 1-30 characters long.
C . Should not be an Oracle Server reserved word.
D . Must contain only A-Z, a-z, 0-+, _, *, and #.
E . Must contain only A-Z, a-z, 0-9, _, $, and #.
F . Must begin with a letter.
-
Which four actions are possible during an Online Data file Move operation?()
A . Creating and dropping tables in the data file being moved
B . Performing file shrink of the data file being moved
C . Querying tables in the data file being moved
D . Performing Block Media Recovery for a data block in the data file being moved
E . Flashing back the database
F . Executing DML statements on objects stored in the data file being moved
-
Which two steps are the result of associating a blade server?()
A . The compute node reboots and is then connected to the CMC
B . A compute node is assigned to a service profile
C . if the association is successful the cisco UCS manager boots the cisco UUOS to configure the compute node
D . The compute node reboots to reload and then loads NX OS and establishes connections to both the CMC and the IOM
-
Which four are attributes of single row functions? ()
A . cannot be nested
B . manipulate data items
C . act on each row returned
D . return one result per row
E . accept only one argument and return only one value
F . accept arguments which can be a column or an expressio
-
Which four statements about an IP service level agreement (SLA) are true? ()
A . SLA responder knows type of operation, the port used, and duration.
B . SLA responder inserts in and out timestamps in the packet payload.
C . SLA sender and responder use the IP SLA Control Protocol to communicate with each other before
D . SLA sender and responder communication can be encrypted.
E . SLA sender and responder communication can be authenticated with MD5.
-
Which four service offerings are included in Oracle Public Cloud?()
A . Database Service
B . Data Service
C . Java Service
D . Security Service
E . .NET Service
F . SOA Service
-
Which four statements about the Carrier Supporting Carrier (CSC) feature are true? ()
A . MPLS is required between the PE and CE routers that connect the backbone carrier to the customer carrier.
B . The backbone carrier must enable the PE router to check that the packets it receives from the CErouter contain only the labels that the PE router advertised to the CE router.
C . Every packet that crosses the backbone carrier must be encapsulated so that the packet includes MPLS labels
D . AII PE routers that link the backbone carrier to the customer carrier must run Route Target Rewrite.
E . Arouting protocol is required between the PE and CE routers that connect the backbone carrierto thecustomer carrier. The routing protocol enables the customer carrier to exchange IGP routing information with the backbone carrier.
-
IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()https://assets.asklib.com/images/image2/2018072709341330622.jpg
A . A
B . B
C . C
D . D
-
Which four statements correctly describe functions that are available in SQL? ()
A . INSTR returns the numeric position of a named character.
B . NVL2 returns the first non-null expression in the expression list.
C . TRUNCATE rounds the column, expression, or value to n decimal places.
D . DECODE translates an expression after comparing it to each search value.
E . TRIM trims the heading or trailing characters (or both) from a character string.
F . NVL compares two expressions and returns null if they are equal, or the first expression if they are not equal.
G . NULLIF compares two expressions and returns null if they are equal, or the first expression if they are not equal.
-
What are the four steps, in their correct order, to mitigate a worm attack?()
A . contain,inoculate,quarantine,and treat
B . inoculate,contain,quarantine,and treat
C . quarantine,contain,inoculate,and treat
D . preparation,identification,traceback,and postmortem
E . preparation,classification,reaction,and treat
F . identification,inoculation,postmortem,and reactio
-
Which four are components of the Cisco collaboration Architecture strategy?()
A . video
B . intercompany communications
C . covergence protocols
D . dedicated networking
E . clod computing
F . enterprise social networking
G . interoperability
-
Which of the following are not steps in setting up aTLS session? ()
A . Client sends Hello to Server listing all of its supported cipher suites
B . Server sends Hello to Client listing all of its supported cipher suites
C . Client calculates and sends encryptedpre_master_secret
D . Client and Server calculate keys from pre_master_secret
E . Server sends Change Cipher Spec to indicate a shift to encrypted mode