-
Which is the correct description of a pinned buffer in the database buffer cache()
A . The buffer is currently being accessed.
B . The buffer is empty and has not been used.
C . The contents of the buffer have changed and must be flushed to the disk by the DBWn process.
D . The buffer is a candidate for immediate aging out and its contents are synchronized with the block contents on the disk.
-
Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN (Choose three.)()。
A . HDLC
B . Ethernet
C . Token Ring
D . PPP
E . FDDI
F . Frame Relay
-
Which of these is a correct description of SSO?()
A . It will only become active after a software failure.
B . It will only become active after a hardware failure.
C . It requires that Cisco NSF be enabled in order to work successfully.
D . It synchronizes the MAC·, FIB·, and adjacency tables between Active and Standby RouteProcessors.
-
Which three of the following are components of a syslog message? ()(Choose three.)
A . time stamp
B . error codes
C . severity level
D . log message name
-
Which three tasks can be performed using a duplicate database? ()(Choose three.)
A . Testing the backup and recovery procedures
B . Testing the upgrade of an Oracle database to a new release
C . Testing the effect of an application changes on database performance
D . Continuously updating archive log files from the target database to support failover
-
Which three elements can a job chain process involve?()
A . an event
B . a schedule
C . a program
D . another chain
E . a lightweight jo
-
Which of the following descriptions best identifies the operating principal of a flash-type evaporator?()
A . Sea water is heated to boiling temperature while under a vacuum
B . Sea water is passed over heated plates in a thin film
C . Heated sea water is injected into a vacuum chamber
D . Sea water is forced through a heated eductor
-
Which of these is a correct description of Stateful Switchover?()
A . It will only become active after a software failure
B . It will only become active after a hardware failure
C . It requires that Cisco N3F· be enabled in order to work successfully
D . It synchronizes the MAC·, FIB·, and adjacency tables between Active and Standby Route Processor
-
Which description is correct for a private VLAN community port with respect to Layer 2 communications?()
A . It communicates with all other community ports in the private VLAN domain.
B . It communicates with only isolated ports in the private VLAN domain.
C . It communicates only with other community ports in the same community and associated promiscuous ports.
D . It communicates only with associated promiscuous and isolated ports.
-
Which three objects are components of a menu module?()
A . Menus
B . Canvases
C . Object libraries
D . Visual attributes
E . Attached librarie
-
As a Cisco Network Engineer, you have to master the knowledge of the Cisco validated Design (CVD) program. Which three of the following descriptions are appropriate about the CVD program?() (Choose three.)
A . It incorporates a narrow range of technologies and products.
B . It facilitates faster and more reliable customer deployments.
C . It extends the value of designs through a sustained development plan.
D . It incorporates products and technologies into enterprise, service provider, and commercial systems.
-
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()
A . The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
B . Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
C . The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
D . The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
E . The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
F . Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
G . None of the other alternatives apply
-
Which command will list ODM class descriptions to provide the format needed to create a new class?()
A . A.odmadd
B . B.odmget
C . C.odmshow
D . D.odmcreate
-
Which three are valid declarations of a float? ()
A . Float foo = -1;
B . Float foo = 1.0;
C . Float foo = 42e1;
D . Float foo = 2.02f;
E . Float foo = 3.03d;
F . Float foo = 0x0123;
-
Which three connection options are available when configuring a switch port to be part of a privateVLAN? ()(Choose three.)
A . isolated mode
B . switchport mode
C . modular mode
D . community mode
E . promiscuous mode
F . global mode
-
Which three of the following descriptions are true about the firewall modes? ()
A . Transparent mode is layer 2.
B . Routed mode is layer 3.
C . Routed mode has 1 IP address.
D . Transparent mode has 1 IP address.
-
Which three statements inserts a row into the table?()
A . INSERT INTO employees VALUES ( NULL, ‘John’,‘Smith’);
B . INSERT INTO employees( first_name, last_name) VALUES(‘John’,‘Smith’);
C . INSERT INTO employees VALUES (‘1000’,‘John’,NULL);
D . INSERT INTO employees(first_name,last_name, employee_id) VALUES ( 1000, ‘John’,‘Smith’);
E . INSERT INTO employees (employee_id) VALUES (1000);
F . INSERT INTO employees (employee_id, first_name, last_name) VALUES ( 1000, ‘John’,‘’)
-
Which three demonstrate an “is a” relationship?()
A . public class X { } public class Y extends X { }
B . public interface Shape { } public interface Rectangle extends Shape{ }
C . public interface Color { } public class Shape { private Color color; }
D . public interface Species { } public class Animal { private Species species; }
E . public class Person { } public class Employee { public Employee(Person person) { }
F . interface Component { } class Container implements Component { private Component[] children; }
-
Which three of the following descriptions are true about the firewall modes? ()
A . Transparent mode is layer 2.
B . Routed mode is layer 3.
C . Routed mode has 1 IP address.
D . Transparent mode has 1 IP address.
-
Which three Layer 2 encapsulation types would be used on a WAN rather than a LAN? (Choose three.)()
A . HDLC
B . Ethernet
C . Token Ring
D . PPP
E . FDDI
F . Frame Relay
-
In which three cases does a checkpoint occur? ()
A . Every three minutes.
B . When a log switch occurs.
C . When forces by an administrator.
D . When a tablespace is taken offline normal.
E . When the redo buffer is one-third full.
-
Which is a description of a private equity firm?
-
_______ gives a vivid and satirical description of Vanity Fair which refers to London at the time of the Restoration.
-
Which of the following is NOT included in the project descriptions of a proposal?