-
Computer systems consist of two very different types of elements:Hardware,which includes all the physical things that can be touched and(),which tells thehardware how to do.
A . Software
B . Courseware
C . Operatingsystem
D . I/Odevice
-
Which four types of object can be thrown using the throw statement?()
A . Error
B . Event
C . Object
D . Exception
E . Throwable
F . Runtime Exceptio
-
Which four types of objects can be thrown using the throw statement?()
A . Error
B . Event
C . Object
D . Exception
E . Throwable
F . RuntimeExceptio
-
Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。
A . denial of service
B . brute force
C . reconnaissance
D . Trojan horse
-
Which of the following drive types can be combined in a single EXP5000 expansion unit?()
A . SSD, SATA and FC only
B . SSD, SAS and FDE only
C . SSD, FDE, SATA and FC only
D . SSD, SAS, FDE, FC and SATA
-
Automatic error notification can be configured to manage which type of disk error?()
A . Hard errors
B . Media errors
C . Temporary errors
D . All disk error type
-
Private VLANS can be configured as which three of these port types?()
A . isolated
B . protected
C . private
D . associated
E . promiscuous
F . munity
-
An attacker is launching a DoS attack on the Company network using a hacking tool designed to exhaust the IP address space available from the DHCP servers for a period of time. Which procedure would best defend against this type of attack? ()
A . Configure only trusted interfaces with root guard.
B . Implement private VLANs (PVLANs) to carry only user traffic.
C . Implement private VLANs (PVLANs) to carry only DHCP traffic.
D . Configure only untrusted interfaces with root guard.
E . Configure DHCP spoofing on all ports that connect untrusted clients.
F . Configure DHCP snooping only on ports that connect trusted DHCP servers.
G . None of the other alternatives apply
-
Which of the following management types can be used to deploy appropriate quality-of-servicesolutions to make the most efficient use of bandwidth?()
A . Fault management
B . Accounting management
C . Operations management
D . Performance management
E . Security management
F . Configuration management
-
Cisco Configuration Assistant supports a variety of virtual private networks. Which three types of VPN can be configured by using CCA?()
A . DMVPN
B . MPLS VPN
C . IPv6 VPN
D . Cisco IOS SSL VPN
E . site-to-site VPN
F . Cisco Easy VPN
-
According to the passage, which of the following can NOT be typed into the same category?
A . A. cloud
B . B. sheep
C . C. trees
D . D. goose
-
Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?()
A . denial of service
B . brute force
C . reconnaissance
D . Trojan horse&e
-
The RMAN BACKUP command using the DELETE INPUT option can be used with which three types of files? ()
A . data files
B . backup sets
C . control files
D . archived redo log file
-
From which type of cloud can a tornado or waterspout develop?()
A . Nimbostratus
B . Altostratus
C . Cumulonimbus
D . Cirru
-
Which of the following types of campaign initiative can be created using WebSphere Commerce Accelerator?()
A . Advertise Discount
B . Let the system suggest products on auction
C . Cross-sell products based on contents of the customer’s wish list
D . Up-sell products based on the contents of the current page
-
Which of the following IOS features can prevent IP spoofing attacks?()
A . PPP over Ethernet
B . Cisco Express forwarding
C . MPLS traffic Engineering
D . IS-IS routing
E . Unicast Reverse Path Forwarding(uRPF)
-
Which of the following cable types can cause interference on the network when disconnecting any one machine?()
A . Coaxial
B . Cat 1 UTP
C . Cat 3 UTP
D . Cat 5 UTP
-
For which two types of applications can the SDM provide wizards?()
A . security services
B . TACACS+services
C . Mpls services
D . Routing services
E . Ppp0e services
F . Poe service
-
Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()
A . Attacker sends multiple DHCP requests flooding DHCP server
B . Attacker connects rogue server initiating DHCP requests
C . Attacker connects rogue server replying to DHCP requests
D . Attacker sends DHCP jam signal causing DHCP server to crash
E . Attacker sends gratuitous ARP replies, thereby jamming the DHCP server
F . Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server
-
When creating a Product Promotion using WebSphere Commerce Accelerator, which of the following discount types can be selected?()
A . Coupon off next purchase
B . Discounted shipping
C . Extra Bonus Points
D . Fixed amount off per item
E . Free gift with purchase
-
On a 3550 EMI switch, which three types of interfaces can be used to configure HSRP? ()
A . Loopback interface
B . SVI interfac
C . Routed port
D . Access port
E . EtherChannel port channel
F . BVI interface
-
Which of the following constraint types can be used to ensure the value of an INTEGER column references only positive values?()
A . Unique
B . Check
C . Referential
D . Informational
-
Three types of body language cues which can all convey meaning are_______.
A. storming, norming, Eye contact
B. speaking, Eye contact, facial expressions
C. eye contact, facial expressions, posture and gestures forming
D. eye contact, facial expressions, pervading
-
Which type of attack uses a database or databases to guess a password in order to gain
A.Hijacking attack
B.Virus attack
C.Dictionary attack
D.Man-in-the-middle attack