-
Which two statements about the DiffServ model are true?()
A . a class can be identified as a single application, multiple applications with similar service needs,or be based on the source or destination IP address
B . a drawback of the DiffServ field in the MAC header to mark frames into behavior aggregates (BAs)
C . DiffServ uses the DiffServ field in the MAC header to mark frames into behavior
D . the DiffServ field occupies the same eight bits of the MAC header that were previously used for the ToS field
E . the first six high-order bits of the DiffServ field are used to identify the Resource Reservation Protocol (RSVP) value
F . the primary goal of DiffServ is scalability
-
Which the two about WAR files are true?()
A . WAR files must be located in the web application library directory.
B . WAR files must contain the web application deployment descriptor.
C . WAR files must be created by using archive tools to designed specifically for that purpose.
D . The web container must serve the content of any META-INF directory located in a WAR file.
E . The web container must allow access to resources in JARs in the web application library directory
-
Which two are characteristics of the Intercepting Filter pattern?()
A . it provides centralized request handling for incoming requests.
B . It forces resource authentication to be distributed across web components.
C . It reduces coupling between presentation-tier clients and underlying business services.
D . It can be added and removed unobtrusively, without requiring changes to existing code.
E . It allows preprocessing and postprocessing on the incoming requests and outgoing responses.
-
Which two statements are true about the hashCode method?()
A . The hashCode method for a given class can be used to test for object equality and object inequality for that class.
B . The hashCode method is used by the java.util.SortedSet collection class to order the elements within that set.
C . The hashCode method for a given class can be used to test for object inequality, but NOT objecte quality, for that class.
D . The only important characteristic of the values returned by a hashCode method is that the distribution of values must follow a Gaussian distribution.
E . The hashCode method is used by the java.util.HashSet collection class to group the elements within that set into hash buckets for swift retrieval.
-
Which two capabilities are granted with the SUPER privilege?()
A . Allowing a client to kill other client connections
B . Allowing a client to shut down the server
C . Allowing change of the server runtime configuration
D . Allowing client accounts to take over the account of another user
-
Which two statements about the configuration of the switch interface are correct (Choose two)()。
A . The switchport belongs only to VLAN 2
B . Interface fa0/0 will be in both VLAN 1 (by default) and VLAN 2
C . The exhibit shows interface fa0/0 to be dynamically mapped to VLAN 2
D . A network host can be connected to this interface
-
Which are the two options to which a menu can be assigned?() (Choose two.)
A . menu
B . functions
C . data group
D . responsibility
E . functional grou
-
Which two are characteristics of the Front Controller pattern?()
A . It simplifies remote interfaces to distributed objects.
B . It promotes cleaner application partitioning and encourages reuse.
C . It provides an initial point of contact for handling all related requests.
D . It reduces maintainability due to the increased complexity of the design.
E . It provides loosely coupled handlers that can be combined in various permutations.
-
Which ones are the two type of ciphers?()
A . Blocking cipher andnon-blocking cipher
B . CBC cipher and EBC cipher
C . Block cipher and Stream cipher
D . Blocker cipher and Streamer cipher
E . 3DES cipher and AES cipher
-
Which the following two statements are true?()
A . An inner class may be declared as static.
B . An anonymous inner class can be declared as public.
C . An anonymous inner class can be declared as private.
D . An anonymous inner class can extend an abstract class.
E . An anonymous inner class can be declared as protected.
-
Which two statements about the DiffServ model are true? ()
A . A class can be identified as a single application, multiple applications with similar service needs, or be based on the source or destination IP addresses.
B . A drawback of the DiffServ model is that it does not provide backward compatibility with devices that can only use the ToS field.
C . DiffServ uses the DiffServ field in the MAC header to mark frames into behavior aggregates (BAs).
D . The DiffServ field occupies the same eight bits of the MAC header that were previously used for the ToS field.
E . The first six high-order bits of the DiffServ field are used to identify the Resource Reservation Protocol (RSVP) value.
F . The primary goal of DiffServ is scalability.
-
Which two statements are true about the Application Grid ?()
A . Application Grid computing brings key industry-leading technologies like MS IIS and Grade WebLogic Server together.
B . Application Grid computing promotes well architectured sharing of resources.
C . Application Grid computing based on Oracle’s RAC technology.
D . Application Grid computing results in more predictable behavior through better instrumentation and more optimal allocation of resources.
-
Which two statements about the diffserv model are true?()
A . a class can be inentified as a single application .multiple applications with similar service nees.or be based on the source or destination ip addresses.
B . a drawback of the diffserv model is that it does not provide backward compatibility with devices that can only use the tos field.
C . diffserv uses the diffserv field in the MAC header to mark frames into behavior aggregates(BAs)
D . the diffserv field occupies the same eight bits of the mac header that were previously used for the tos field.
E . the first six high-order bits of the diffserv field are used to identify the resource reservation protocol(RSVP) value .
F . the primary goal of diffserv is scalabilty.
-
Which the two are valid and equivalent?()
A .https://assets.asklib.com/images/image2/2018073115112695987.jpg
B .https://assets.asklib.com/images/image2/2018073115114664903.jpg
C .https://assets.asklib.com/images/image2/2018073115123688801.jpg
D .https://assets.asklib.com/images/image2/2018073115124427624.jpg
E .https://assets.asklib.com/images/image2/2018073115125392737.jpg
-
Which two service components are in the plan phase?()
A . Proof of Concept
B . Site Readiness Assessment
C . Proposal Development
D . Operations Readiness Assessment
E . Account planning
-
Which the two are reserved words in Java?()
A . run
B . import
C . default
D . implement
-
Which two statements are true about the WebLogic Cluster ?()
A . Clustered Servers capacity can be increased by adding new server instance to the cluster on an existing machine
B . Clustered Servers can be on a same or different machine with same operating system only
C . Clustered Servers can only be on a same machine or different operating system
D . Clustered Servers can be on a same or different machine with same or different operating system
-
Which two are characteristics of the Service Locator pattern?()
A . It encapsulates component lookup procedures.
B . It increases source code duplication and decreases reuse.
C . It improves client performance by caching context and factory objects.
D . It degrades network performance due to increased access to distributed lookup services.
-
Which the two choices are equivalent?()
A . 3 / 2
B . 3 < 2
C . 3 * 4
D . 3 << 2
E . 3 * 22
F . 3 <<<2
-
Which two libraries are the top 2 libraries in the world?
A、National Library of Canada
B、British Library
C、Library of Congress
D、Library of Russian Academy of Science
-
Which of the two states are the last two states to join the union?
-
Which are the two key concepts for effectiveness?
-
There are no two leaves which are the same in the world