-
What are the three partner benefits of service contracts?()
A . produces higher margins than product sales along
B . generate recurring revenue
C . strengthens customer loyalty
D . renews automatically for the lifetime of the product
E . helps customers speed architectural planning and design
F . eliminates network problem
-
Which three pieces of information are contained in a Service Profile for related vNICs?()
A . MAC address
B . MTU
C . IP address
D . VLAN connectivity information
E . UUID
-
What are three benefits of implementing vlans?()
A . A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure
B . Broadcast storms can be mitigated by decreasing the number of broadcast domains,thus increasing their size.
C . A higher level of network security can be reached by separating sensitive data traffic from other network traffic.
D . Port-based vlans increase switch-port use efficient,thanks to 802.1Q trunks
E . A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure.
F . Broadcast storms can be mitigated by increasing the number of broadcast domains,thus reducing their size.
G . VLANs make it easier for IT staff to configure new logical groups,because the vlans all belong to the same broadcast domain.
-
What are three components of Cisco Technical Support Services?()
A . Application Software Updates
B . Cisco Advisory Services
C . Advanced Hardware Replacement
D . Software Support
E . Cisco.com
F . Warranty for hardware
-
What are three benefits of GLBP?()
A . GLBP supports up to eight virtual forwarders per GLBP group
B . GLBP supports clear text and MD5 password authentication between GLBP group members
C . GLBP is an open source standardized protocol that can be used with multiple vendors
D . GLBP supports up to 1024 virtual routers
E . GLBP can load share traffic across a maximum of four routers
F . GLBP elects two AVGs and two standby AVGs for redundancy
-
Which three pieces of information are used to calculate the total bandwidth of a VoIP call?()
A . the packetization size
B . the serialization of the interface
C . the quantization
D . the packet rate
E . the UDP overhead
F . the TCP overhead
-
What three pieces of information can be used in an extended access list to filter traffic? (Choose three.)()
A . protocol
B . VLAN number
C . TCP or UDP port numbers
D . source switch port number
E . source IP address and destination IP address
F . source MAC address and destination MAC addre
-
What are the three elements of configuring congestion management?()
A . queue creation
B . determining packet drop thresholds
C . determining the random early detection method
D . traffic classification
E . queue scheduling
F . FIFO configuratio
-
Which three pieces of information are available from the Cisco CRS 4.0 Control Center?()
A . System Parameters Configuration
B . Cisco Unified CallManager Cluster Status
C . Date, Time, and Reason of Last Failure
D . Cisco CRS License Information
E . Cisco CRS Datastore Replication Status
F . Cisco CRS Component Activation&e
-
What are three advantages of VLANs?()
A . VLANs establish broadcast domains in switched networks.
B . VLANs utilize packet filtering to enhance network security.
C . VLANs provide a method of conserving IP addresses in large networks.
D . VLANs provide a low-latency internet working alternative to routed networks.
E . VLANs allow access to network services based on department, not physical location.
F . VLANs can greatly simplify adding, moving, or changing hosts on the network.
-
Which three pieces of information are considered while deciding the size of the undo tablespace in your database?()
A . the size of an undo block
B . the size of the redo log files
C . undo blocks generated per second
D . the size of the database buffer cache
E . the value of the UNDO_RETENTION parameter
-
What are the three main parts of a syslog message? ()(Choose three.)
A . severity level
B . facility
C . log message name
D . time stamp
E . error codes
F . access privilege
-
What are three purposes of the RMAN “FROM” clause?()
A . to support PUSH-based active database duplication
B . to support synchronization of a standby database with the primary database in a Data environment
C . To support PULL-based active database duplication
D . To support file restores over the network in a Data Guard environment
E . To support file recovery over the network in a Data Guard environment
-
Which three pieces of information are to be mandatorily provided while creating a new listener using Enterprise Manager Database Control?()
A . the port used by the listener
B . the protocol used by the listener
C . the server name where the listener runs
D . the log file and trace file destination for the listener
E . the database services to be registered with the listener
-
What are three characteristics of the OSPF routing protocol?()
A . It converges quickly.
B . OSPF is a classful routing protocol.
C . It uses cost to determine the best route.
D . It uses the DUAL algorithm to determine the best route.
E . OSPF routers send the complete routing table to all directly attached routers.
F . OSPF routers discover neighbors before exchanging routing information.
-
What are three benefits of implementing vlans?()
A . A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure
B . Broadcast storms can be mitigated by decreasing the number of broadcast domains,thus increasing their size
C . A higher level of network security can be reached by separating sensitive data traffic from other network traffic
D . Port-based vlans increase switch-port use efficient,thanks to 802.1Q trunks
E . A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure
F . Broadcast storms can be mitigated by increasing the number of broadcast domains,thus reducing theirsize
G . VLANs make it easier for IT staff to configure new logical groups,because the vlans all belong to thesame broadcast domai
-
What are three functions of a WebSphere Node Agent?()
A . monitors performance
B . manages JVM memory
C . serves J2EE applications
D . manages the deployment manager
E . manages configuration synchronization
F . routes administrative requests to server
-
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。
A . protocol
B . VLAN number
C . TCP or UDP port numbers
D . source switch port number
E . source IP address and destination IP address
F . source MAC address and destination MAC addre
-
What are three features of the IPV6 protocol?()
A . complicated header
B . plug-and-play
C . no broadcasts
D . checksums
E . optional IPsec
F . autoconfiguratio
-
What are three benefits of using ASM?()
A . Ease of disk administration and maintenance
B . Load balancing across physical disks
C . Software RAID-1 data redundancy with double or triple mirrors
D . Automatic recovery of failed disk
-
What are three advantages of VLANs?()
A . VLANs establish broadcast domains in switched networks.
B . VLANs utilize packet filtering to enhance network security.
C . VLANs provide a method of conserving IP addresses in large networks.
D . VLANs provide a low-latency internetworking alternative to routed networks.
E . VLANs allow access to network services based on department,not physical location.
F . VLANs can greatly simplify adding,moving,or changing hosts on the network.
-
What are the three categories of Chinese painting?
-
What are the three different views of language()?
A.the structural view
B.the communicative view
C.interactional view
D.functional view
此题为多项选择题。