-
Which three SELECT statements displays 2000 in the format “$2,000.00”?()
A . SELECT TO CNAR(2000, ‘$#,###.##’) FROM dual;
B . SELECT TO CNAR(2000, ‘$0,000.00’) FROM dual;
C . SELECT TO CNAR(2000, ‘$9,999.00’) FROM dual;
D . SELECT TO CNAR(2000, ‘$9,999.99’) FROM dual;
E . SELECT TO CNAR(2000, ‘$2,000.00’) FROM dual;
F . SELECT TO CNAR(2000, ‘$N,NNN.NN’) FROM dual
-
Which three are described in the standard web application deployment descriptor?()
A . session configuration
B . MIME type mappings
C . context root for the application
D . servlet instance pool configuration
E . web container default port bindings
F . Servlet Context initialization parameter
-
Which three menu item types are valid in a menu module?()
A . Magic
B . Plain
C . Check
D . List item
E . Divider
-
Which three of these service components are in the implement phase?()
A . Staging
B . Business Requirements Development
C . Post Implementation Support Handoff Meeting
D . Detailed Design Development
E . Staff Training
F . Incident Management
-
Which three are used in configuring Call Manager dial plans? ()
A . route list
B . route group
C . gateway list
D . route patter
-
Which three are used in configuring Call Manager dial plans? ()
A . route list
B . route group
C . gateway list
D . route patter
-
You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()
A . Import the user accounts as inetOrgPerson objects.
B . Import the user accounts into Active Directory by using the Ldifde command-line tool.
C . Export all user accounts from the UNIX servers to a text file.
D . Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.
E . Assign random passwords to each user object, and securely distribute the password to the users.
F . Create the same strong password for each user object, and require users to change their passwords at first logon.
G . Instruct users to use the same name and password as they used on the UNIX servers.
-
Which three SELECT statements displays 2000 in the format "$2,000.00"? ()
A . SELECT TO CNAR(2000, '$#,###.##') FROM dual;
B . SELECT TO CNAR(2000, '$0,000.00') FROM dual;
C . SELECT TO CNAR(2000, '$9,999.00') FROM dual;
D . SELECT TO CNAR(2000, '$9,999.99') FROM dual;
E . SELECT TO CNAR(2000, '$2,000.00') FROM dual;
F . SELECT TO CNAR(2000, '$N,NNN.NN') FROM dual
-
You want to create a valid directory structure for your Java EE web application, and your application usestag files and a JAR file. Which three must be located directly in your WEB-INF directory(NOT in asubdirectory of WEB-INF)?()
A . The JAR file
B . A directory called lib
C . A directory called tags
D . A directory called TLDs
E . A directory called classes
F . A directory called META-INF
-
Which three are interframe spaces defined in 802.11?()
A . SIFS
B . PIFS
C . DIFS
D . LIFS
E . NAV
F . CWmi
-
Given that file is a reference to a File object that represents a directory, which code fragments will succeed in obtaining a list of the entries in the directory?()
A . Vector filelist = ((Directory) file).getList();
B . String[] filelist = file.directory();
C . Enumeration filelist = file.contents();
D . String[] filelist = file.list();
E . Vector filelist = (new Directory(file)).files();
-
Which three roles are predefined in the Cisco UCS system?()
A . Server Admin
B . Network Admin
C . Storage Admin
D . Security Admi
-
Which three actions are allowed in event details? ()(Choose three.)
A . Send
B . Raise
C . Delete
D . Receive
E . Acknowledge
-
You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()
A . Import the user accounts as inetOrgPerson objects.
B . Import the user accounts into Active Directory by using the Ldifde command-line tool.
C . Export all user accounts from the UNIX servers to a text file.
D . Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.
E . Assign random passwords to each user object, and securely distribute the password to the users.
F . Create the same strong password for each user object, and require users to change their passwords at first logon.&e
-
In which two web application directories can dependent classes and libraries be located? ()
A . /WEB-INF/lib as a JAR file
B . /META-INF/lib as a JAR file
C . /classes as compiled class files
D . /WEB-INF/lib as compiled class files
E . /WEB-INF/classes as compiled class files
F . /META-INF/classes as compiled class file
-
Which three are advantages to creating multiple areas in OSPF? (Choose three.) Select 3 response(s)?()
A . less frequent SPF calculations
B . fewer hello packets
C . smaller routing tables
D . reduced LSU overhe ad
E . fewer adjacencies needed
-
Which three types of files can be automatically placed in the flash recovery area (fast recovery area in 11g Release 2)?() (Choose three.)
A . Alert log file
B . Archived redo log files
C . Control file autobackups
D . Server Parameter file (SPFILE)
E . Recovery Manager (RMAN) backup piece
-
In which three situations is incomplete recovery required?()
A . After a shutdown abort.
B . When recovering to an SCN.
C . When recovering until a specific time.
D . When a required archived log is missing.
-
Which storage subsystem can place files from the same directory in different storage poolsautomatically for improved performance?()
A . XIV system
B . SONAS
C . DS5300
D . DS8700
-
Which three SELECT statements display 2000 in the format "$2,000.00"? ()
A . SELECT TO_CHAR(2000, '$#,###.##') FROM dual;
B . SELECT TO_CHAR(2000, '$0,000.00') FROM dual;
C . SELECT TO_CHAR(2000, '$9,999.00') FROM dual;
D . SELECT TO_CHAR(2000, '$9,999.99') FROM dual;
E . SELECT TO_CHAR(2000, '$2,000.00') FROM dual;
F . SELECT TO_CHAR(2000, '$N,NNN.NN') FROM dual
-
In which three directories, relative to a web application’s root, may a tag library descriptor file reside when deployed directly into a web application?()
A . /WEB-INF
B . /META-INF
C . /WEB-INF/tlds
D . /META-INF/tlds
E . WEB-INF/resources
F . /META-INF/resource
-
Which three service components are in the operate phase?()
A . System Monitoring
B . Operations Implementation
C . Incident and Problem Management
D . Change Management
E . Operations Plan
F . Project Close Out
-
Which three items are configured in MST configuration submode? ()
A . Region name
B . Configuration revision number
C . VLAN instance map
D . IST STP BPDU hello timer
E . CST instance map
F . PVST+ instance ma
-
In which three cases does a checkpoint occur? ()
A . Every three minutes.
B . When a log switch occurs.
C . When forces by an administrator.
D . When a tablespace is taken offline normal.
E . When the redo buffer is one-third full.