Easy VPN operates in two modes. Although Client Mode has advantages, there are environments where it should not be used.()
A . Teleworker devices must be accessed from the central site (server, printers).
B . IP addressing is simplified.
C . The Teleworker LAN is a transit networking for routing.
D . An Enterprise application does not function with Network Address Translation.
E . The Teleworker router is an MPLS PE node.
-
The load sharing characteristics of two diesel generator operating in parallel are mostly dependent on their governor ().
A . load limit settings
B . idle speed settings
C . speed limit settings
D . speed droop setting
-
When two DC generators operate in parallel, they are protected against motorizing by()
A . blow out coils
B . governor relay
C . under voltage trips
D . reverse current tri
-
In Multicast VPN (MVPN) implementations, which two of the following statements are regarding the DefaultMDT Group?()
A . It is used for PIM control traffic
B . It is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routers
C . Within the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sources
D . There is a reduced multicast state in the MPLS core P routers
E . When multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth
-
Refer to the exhibit. Given the topology shown, what are two ways to allow the VPN to operate?()https://assets.asklib.com/images/image2/2018080114364950184.jpg
A . Use route maps on the 831
B . The 831 has IPSec NAT-Transparency (NAT-T) enabled
C . Disallow split tunneling on the 831
D . IPSec pass-through must be enabled on the Linksys
E . Use the port-mapping feature on the residential router
-
Which two file types must be included in a closed database backup taken with operating system commands?()
A . data files
B . control file
C . password file
D . online redo log files
E . initialization parameter file
-
The load between two steam-driven alternators operating in parallel may be adjusted by varying ()
A . the speed of the alternators
B . the field strength of the machines
C . the power factor of the alternators
D . steam supply to the prime mover
-
If two AC generators are to be operated in parallel, the load is distributed evenly by()
A . means of rheostat the governor settings
B . a balance coil excitation
C . adjusting the governor settings
D . changing excitatio
-
On commonly used ships,if two A√Cgenerators are operated in parallel, the load is distributed evenly by ().
A . varying the D-Cexciter voltage
B . varying the reluctance of the air gap
C . regulating the speed of prime mover
D . shorting out part of the armature winding
-
The operation of () two alternators requires the voltages to be equal and also in phase.
A . paralleling
B . series-mounting
C . running
D . control
-
If two AC generators are operated in parallel, the load is distributed evenly by()
A . a rheostat
B . a balancing coil
C . changing field excitation
D . adjusting the governor setting
-
Which two operations are NOT performed by the DUPLICATE command in Recovery Manager (RMAN) whileduplicating a running database? ()(Choose Two)
A . Creating the control file for the duplicate database
B . Restoring the target data files to the duplicate database
C . Performing complete recovery using all available backups
D . Generating a new, unique DBID for the duplicate database
E . Copying the online redo log files from the target database to the duplicate database
-
Switch ports operating in which two roles will forward traffic according to the IEEE 802.1w standard?()
A . alternate
B . backup
C . designated
D . disabled
E . root
-
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
A . fewer devices to manage
B . moderate-to-high scalability
C . stateful inspection of decrypted VPN traffic
D . increased bandwidth with additional interfaces
E . decreased complexity as traffic is filtered from the firewall
-
Which two operations are NOT performed by the DUPLICATE command in Recovery Manager (RMAN) while duplicating a running database?()
A . Creating the control file for the duplicate database
B . Restoring the target data files to the duplicate database
C . Performing complete recovery using all available backups
D . Generating a new, unique DBID for the duplicate database
E . Copying the online redo log files from the target database to the duplicate database
-
In Real Operations Automation, we have Domain Template and WebLogic Scripting Tool for provisioning and configuration respectively. Which are the other two elements ?()
A . Weblogic Cluster
B . Weblogic Cache
C . Weblogic Grid
D . Weblogic Deployment&e
-
Your database is in NOARCHIVELOG mode. After which two operations you should take the backup of control file?()
A . adding a new user to the database
B . dropping a user from the database
C . dropping a table from the database
D . dropping a data file from a tablespace
E . adding a new tablespace to the database
-
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
A . fewer devices to manage
B . moderate-to-high scalability
C . stateful inspection of decrypted VPN traffic
D . increased bandwidth with additional interfaces
E . decreased complexity as traffic is filtered from the firewall
-
The operation of paralleling two alternators requires the voltages to be ()and also in phase.
A . zero
B . eliminated
C . different
D . equal
-
Which two data intergrity algorithms are commonly used in VPN solutions?()
A . HMAC-MD5
B . RSA
C . HMAC-SHA-1
D . DH1
E . DH2
-
Which two statements are correct with regard to route distinguisher as defined in RFC 4364-AKA IP-VPN(MPLS-VPN)?()
A . The configuration to define Route-Distinguisher is Ip vrf bulle Rd 1:1
B . A route distinguisher can be imported and exported to and from a VRF
C . Route-Distinguisher is an 8 byte BGP attribute value used in influencing BGP best path algorithm.
D . Route-Distinguisher is an 8 byte value used in creating unique VPNv4 address.
-
Why will a two stage flash type distilling plant tend to operate more efficiently when operating in cold seawater?()
A . The colder seawater passing through the condenser tube bundles of the various stages increases evaporator vacuum
B . The amount of heated feed water discharged from the feed water heater after cndenser is increased
C . Fewer non-condensable gases are created by the flow of colder seawater
D . More seawater is allowed to pass through the flint stage overflow weir
-
Refer to the exhibit. Easy VPN operates in two modes. The exhibit represents network extension mode. Choose the best reason for using this mode.()https://assets.asklib.com/images/image2/2018080114285155907.jpg
A . Teleworker devices must be accessed from the central site (server, printers).
B . IP addressing is simplified.
C . The Teleworker LAN is a transit networking for routing.
D . The Teleworker router is an MPLS PE node.
-
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
A . RADIUS or LDAP
B . an internal router running EIGRP
C . Reverse Route Injection and OSPF or RIPv2
D . the VPN appliance to be deployed in line with the firewall
-
Hydraulically, servo-operated, automatic, change over valves, utilized in a two ram hydraulic steering gear, serve to .
A.allow an alternate main pump to start in the fully loaded condition thus developing immediate full torque
B.prevent either main pump from being hydraulically motored when idle by cross pressure flow
C.prevent both units from operating simultaneously which could result in doubling the flow of oil and pressure leading to over pressurization of the system
D.all of the above