Payback is best used to evaluate which type of projects?
A.Low-cost,short-term
B.High-cost,short-term
C.Low-cost,long-term
D.High-cost,long-term
时间:2023-08-05 15:52:59
-
For which two tasks would it be best NOT to use the utility SQL*Loader?()
A . When loading selected rows into each table.
B . When loading data from an export dump file.
C . When loading data from disk, tape, or named pipes.
D . When your data is NOT being inserted from a flat file.
E . When using a record management system to access data files.
-
The best method for tying two lines of the same size together is by using a().
A . becket bend
B . two bowlines
C . single carrick bend
D . square knot
-
An engineer is preparing an implementation plan in which the configuration needs to influence BGP's choice of best path. Which of the following is least likely to be used by the configuration in this imple mentation plan?()
A . Weight
B . Origin code
C . AS_Path
D . Local_Pref
-
The best way to determine if a load is within maximum lift limits is to use().
A . a boom angle indicator
B . a load weight indicator
C . material invoices for shipping weights
D . prior experience with similar lift
-
The best method to secure a towline to bitts is to().
A . take a round turn on the bitt farthest from the pull and use figure-eights
B . take a round turn on the bitt closest to the pull and use figure-eights
C . use figure-eights and take a round turn at the top of the bitts
D . use only figure-eight
-
Ⅲ. There are four choices following each statement. Mark the choice that can best complete the statement: If a linguistic study describes and analyzes the language people actually use, it is said to be ()
A . prescriptive
B . analytic
C . descriptive
D . linguistic
-
A customer is debating whether to use Shared Ethernet versus Virtual Ethernet. Which of the following best describes a key difference between Shared and Virtual Ethernet?()
A . Shared Ethernet runs on POWER4 systems
B . Virtual Ethernet runs on POWER4 systems
C . Shared Ethernet requires a Virtual I/O server and Advanced Power Virtualization
D . Virtual Ethernet requires a Virtual I/O server and Advanced Power Virtualizatio
-
Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()
A . ARP
B . SSH
C . Telnet
D . WEP
E . SNMPv1
F . SNMPv2
-
To have the best possible voice quality and to utilize effectively the available bandwidth, which queuing and compression mechanisms need to be used?()
A . class-based weighted fair queuing (CBWFQ)
B . low latency queuing (LLQ)
C . priority queuing (PQ) or custom queuing (CQ)
D . Real-Time Transport Protocol (RTP) header compression
E . TCP header compression
F . UDP header compressio
-
An attacker is launching a DoS attack on the Company network using a hacking tool designed to exhaust the IP address space available from the DHCP servers for a period of time. Which procedure would best defend against this type of attack? ()
A . Configure only trusted interfaces with root guard.
B . Implement private VLANs (PVLANs) to carry only user traffic.
C . Implement private VLANs (PVLANs) to carry only DHCP traffic.
D . Configure only untrusted interfaces with root guard.
E . Configure DHCP spoofing on all ports that connect untrusted clients.
F . Configure DHCP snooping only on ports that connect trusted DHCP servers.
G . None of the other alternatives apply
-
An AIX LPAR has been reconfigured to use direct-attached disks. What is the best way to fully remove and delete the Virtual IO volumes?()
A . On the AIX LPAR: rmdev -dl hdisk#, rmdev -dl vscsi#
B . On the VIO Server: rmdev -dev rootvg_disk, rmlv rootlv_name
C . On the AIX LPAR: rmdev -dl hdisk#, rmdev -dl vscsi# On the VIO Server: rmdev -dev rootvg_disk, rmlv rootlv_name
D . On the VIO Server: rmdev -dev rootvg_disk, rmlv rootlv_name On the AIX LPAR: rmdev -dl hdisk#, rmdev -dl vscsi#
-
Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()
A . ARP
B . SSH
C . Telnet
D . WEP
E . SNMPv1
F . SNMPv2
-
After you have restored and recovered a database to a new host by using a previously performed Recovery Manager (RMAN) backup, which is the best option you would consider for the new database?()
A . Opening the database in RESTRICTED mode
B . Opening the database with the RESETLOGS option
C . Setting a new DBID for the newly restored database
D . Restoring the server parameter file (SPFILE) to the new host
-
You are implementing basic switch security best practices. Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()
A . Make all ports private VLAN ports.
B . Place all unused ports in native VLAN 1 until needed.
C . Proactively configure unused switch ports as access ports.
D . Disable Cisco Discovery Protocol globally.
-
In order to ensure best read performance, which of the following indicates how large an application’s read buffer size should be if the filesystem to be read is striped across N disks using LVM striping?()
A . N times the stripe unit size
B . N times the VMM minfree parameter
C . The same value as that of the VMM maxfree parameter
D . The same value as that of the VMM maxrndwrt parameter
-
If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()
A . A sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor link
B . A sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchanged
C . A SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor door
D . A SHAM link is part of OSPF network of MPLS-VPN provider
-
It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()
A . IPSec
B . IPSec with GRE
C . DMVPN
D . EZVPN
E . all of the choice
-
What is the best way to describe Freuds approach to psychology?
-
An investment of $42,000 is expected to generate the following annual cash flows:Year 1 $10,000Year 2 $15,000Year 3 $15,000Year 4 $12,000Assume straight-line depreciation is used. Ignore income taxes. What is the payback period?
-
The trouble is tht not mny students relly know how to mke use of their time to its besThe trouble is tht not mny students relly know how to mke use of their time to its best ______.benefit B.dvntge C.vlue D.profit
A.benefit
B.advantage
C.value
D.profit
-
It refers to words that one is able to recognize and comprehend while reading or listening but unable to use automatically in speaking or writing. ---- Choose the one that best suits the description above.()
A、Receptive vocabulary
B、Socio-constructivist theory
C、The main aim of English language teaching
D、Top-down model
-
In order to (attain) our objective, it is (essential) that we (will make) the best use
In order to (attain) our objective, it is (essential) that we (will make) the best use of the limited resources (available).
A. attain
B. essential
C. will make
D. available
-
Which of the following can be used to best describe the president?
A.Honest.
B.Intelligent.
C.Considerat
E.
D.Consultativ
E.
-
Debbie must inform Janice that she is not eligible to have an August vacation for which she recently applied. Which of the following sentences best demonstrates the “you” view Debbie should use in den
A.I have not approved your August vacation because you applied too late
B.We didn’t receive your application early enough for the August vacation schedule
C.Although the August vacation schedule is full, you may qualify for a vacation in September if you apply now
D.The August vacation schedule was posted in May. You should have consulted it earlier