Following is the list of locations in random order where oranfstab can be placed. 1./etc/mtab 2.$ORACLE_HOME/dbs/oranfstab 3./etc/oranfstab What is the sequence in which Direct NFS will search the locations?()
A . 1, 2, 3
B . 3, 2, 1
C . 2, 3, 1
D . 1, 3, 2
-
Which of the following listed diagnostics products provides easy notification and identification of a failed component, even if the power is off? ()
A . Insight manager
B . PowerPath
C . LightPath Diagnostics
D . Sun Server Diagnostic
-
Which of the following is NOT on the list items to be recorded in Oil Record Book Part I (machinery space operation)?()
A . Accidental discharge of oil
B . Disposal of oil residues
C . Quantity of water produced by FWG
D . Discharge of dirty ballast or cleaning water from fuel oil tank
-
You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()
A . Enable root guard to mitigate ARP address spoofing attacks.
B . Configure DHCP spoofing to mitigate ARP address spoofing attacks.
C . Configure PVLANs to mitigate MAC address flooding attacks.
D . Enable root guard to mitigate DHCP spoofing attacks.
E . Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted ports.
F . Configure port security to mitigate MAC address flooding
G . None of the other alternatives apply
-
In which of the following lists of APS Action Requests is the priority correctly arranged from lowest tohighest?()
A . Wait-to-Restore,Forced Switch,Manual Switch,Lockout of Protection
B . Manual Switch,Wait-to-Restore,Lockout of Protection,Forced Switch
C . Lockout of Protection,Forced Switch, Manual Switch,Wait-to-Restore
D . Lockout of Protection,Manual Switch, Forced Switch,Wait-to-Restore
E . Wait-to-Restore,Manual Switch,Forced Switch,Lockout of Protection
F . Wait-to-Restore,Manual Switch,Lockout of Protection,Forced Switch
-
The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.0 0.0.0.255 any What is the effect of this access list configuration?()
A . permit all packets matching the first three octets of the source address to all destinations
B . permit all packet matching the last octet of the destination address and accept all source addresses
C . permit all packet matching the host bits in the source address to all destinations
D . permit all packet from the third subnet of the network address to all destinatio
-
Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()
A . /var/rmc/ctrmc.acls
B . /etc/ctrmc/rsct.acls
C . /etc/security/rsct.acls
D . /usr/sbin/rsct/cfg/ctrmc.acl
-
What is the effect of the following access list condition access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。
A . permit all packets matching the first three octets of the source address to all destinations
B . permit all packets matching the last octet of the destination address and accept all source addresses
C . permit all packets from the third subnet of the network address to all destinations
D . permit all packets matching the host bits in the source address to all destinations
E . permit all packets to destinations matching the first three octets in the destination addre
-
Which of these is an accurate list of Cisco Lifecycle Services phases? Select exactly 1 answer(s) from the following:()。
A . initiation planning analysis design development implementation operations and maintenance
B . project planning, site assessment risk assessment solution selection and acquisition, testing, and operations
C . prepare, plan, design, implement operate, and optimize
D . analysis, design, deployment testing, implementation, and production
E . presales, project planning, development implementation, operations testing, and operations sign- off
-
Which of the following are benefits provided with access control lists (ACLs)?()
A . ACLs monitor the number of bytes and packets.
B . Virus detection.
C . ACLs dentify interesting traffic for DDR.
D . ACLs provide IP route filtering.
E . ACLs provide high network availability.
F . ACLs classify and organize network traffic.
-
Which of the following are characteristics of named access lists?()
A . Individual statements in a named access list may be deleted.
B . They require a numbered range from 1000 to 1099.
C . When created, they must be specified as standard or extended.
D . They are created with the ip access-list command.
E . The entire access list must be deleted before editing.
F . They are applied with the ip name-group command.
-
james needs to sort a list of values in a list of values in fieldA, and when the form in saved ,he wants to sort the list before it is saved. Which one of the following formulas would accomplish this?()
A . @sort
B . @sort(@thisvalue)
C . @sortAscending(fieldA)
D . @sort(“ascesding”;”fieldA”)
-
helga is working with a multi-value field that has numeric values in a list. she would like to apply a formula to each item in the list, return the list which one of the following @fuctions can she use to accomplish this with one line of code?()
A . @transform
B . @Listprocess
C . @processlist
D . @listevaluate
-
Following is the list of locations in random order where oranfstab can be placed. 1./etc/mtab 2.$ORACLE_HOME/dbs/oranfstab 3./etc/oranfstab What is the sequence in which Direct NFS will search the locations?()
A . 1,2,3
B . 3,2,1
C . 2,3,1
D . 1,3,2
-
On a newly installed router, the following access list is added to the HSSI interface for incoming traffic:Access-list 101 permit tcp any 10.18.10.0 0.0.0.255 eq tcp What is the effect of the "any" keyword in the above access list?()
A . check any of the bits in the source address
B . permit any wildcard mask for the address
C . accept any source address
D . check any bit in the destination address
E . permit 255.255.255.255 0.0.0.0
F . accept any destinatio
-
What is the effect of the following access list condition? access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。
A . permit all packets matching the first three octets of the source address to all destinations
B . permit all packets matching the last octet of the destination address and accept all source addresses
C . permit all packets from the third subnet of the network address to all destinations
D . permit all packets matching the host bits in the source address to all destinations
E . permit all packets to destinations matching the first three octets in the destination addre
-
Which of the following options lists the steps in PPP session establishment in the correct order?()
A . Optional authentication phase, link establishment phase, network layer protocol phase.
B . Network layer protocol phase, link establishment phase, optional authentication phase.
C . Network layer protocol phase, optional authentication phase, link establishment phase.
D . Link establishment phase, network layer protocol phase, optional authentication phase.
E . Link establishment phase, optional authentication phase, network layer protocol phase.
F . Optional authentication phase, network layer protocol phase, link establishment phase.
-
Which of the following is the correct command to list the filesystems in datavg?()
A . lsvg -p datavg
B . lsvg -l datavg
C . lsvg -L datavg
D . lsvg -o datavg
-
Which of the following answer choices are correct characteristics of named access list?()
A . You can delete individual statements in a named access list
B . Named access lists require a numbered range from 1000 to 1099.
C . Named access lists must be specified as standard or extended.
D . You can use the ip access-list command to create named access lists.
E . You cannot delete individual statements in a named access list.
F . You can use the ip name-group command to apply named access lists.
-
Which of the following terms on the B/L shows that the Bill of Lading is clean B/L?( )
-
Router R1 exists in an Enterprise that uses EIGRP as its routing protocol. The show ip route command output on router R1 lists the following phrase: "Gateway of last resort is 1.1.1.1 to network 2.0.0.0".Whic h of the following is most likely to have caused this output to occur on R1?()
A. R1 has been configured with an ip default- network 2.0.0.0 command.
B. R1 has been configured with an ip route 0.0.0.0 0.0.0.0 1.1.1.1 command.
C. R1 has been configured with an ip route 2.0.0.0 255.0.0.0 1.1.1.1 command.
D. Another router has been configured with an ip default - network 2.0.0.0 command.
E. Another router has been configured with an ip route 2.0.0.0 255.0.0.0 1.1.1.1 command.
-
6 Part Ⅲ Reading Comprehension Task 4 Directions: The following is a list of public signs. After reading it, you are required to find the items equivalent to those given in Chinese in the table below.
A.当心夹手
B.请勿登踏
C.服务区
D.勿靠车门
E.严禁超速
F.正在检修G. 前方学校H. 靠右站立I. 路面结冰J. 紧急情况击碎玻璃
-
Directions: The following is list of terms. After reading it, you are required to find the items equivalent ....... (相同) those given in Chinese in the table below. Then you should put the corresponding letters in the brackets numbered 26 through 30.
A--legal retirement
H--ensure
B- overlook
I- inspiration
C--boost
J- competition
D--social media
K- dependence
E--benefit
L--balance
F--graduate
M--record
G- conduct
N- career planning
Example: (A)合法退休 (I)灵感;鼓舞
26()改善;促进;增强 ()记录
27()社交媒体 ()利益,好处;优势
28()组织;实施;进行;处理 ()平衡
29()竞争 ()职业规划
30()忽视;忽略,没注意到 ()毕业
-
Among the following economies,__ is not among the list of Asia’s Four Tigers()
A.Thailand
B.Singapore
C.China’s Taiwan
D.China’s Hong Kong