-
Which three activities are supported by the Data Recovery Advisor?()
A . Advising on block checksum failures
B . Advising on inaccessible control files
C . Advising on inaccessible block change tracking files
D . Advising on empty password files
E . Advising on invalid block header field value
-
You are designing the DNS zone to support the Active Directory domain for Contoso.Ltd. Which two actions should you perform?()
A . Create ad.contoso.com as a standard primary DNS Zone.
B . Create ad.contoso.com as an Active DirectoryIntegrated DNS Zone.
C . Enable only authorized client computers to update DNS.
D . Configure a zone transfer between the DNS server at the ISP and the DNS servers at Contoso.Ltd.
-
You are designing a DHCP strategy for the new Active Directory environment. Which two groups have the necessary rights to authorize the DHCP servers?()
A . IT staff in Atlanta
B . IT staff in Seattle
C . DHCP administrators in all offices
D . DHCP administrators in Atlanta only
E . Members of the Enterprise Admins grou
-
You are designing a DHCP strategy for the new Active Directory environment.Which two groups have the necessary rights to authorize the DHCP servers?()
A . IT staff in Atlanta
B . IT staff in Seattle
C . DHCP administrators in all offices
D . DHCP administrators in Atlanta only
E . Members of the Enterprise Admins grou
-
Your network contains an Active Directory domain that has two sites. You need to identify whether logon scripts are replicated to all domain controllers. Which folder should you verify()
A . GroupPolicy
B . NTDS
C . SoftwareDistribution
D . SYSVOL
-
Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()
A . access point certification and software control
B . compression and Layer 3 address mapping
C . Layer 3 addressing and distribution
D . packet encapsulation, fragmentation, and formatting
E . SNMP monitoring service
-
You want to analyze a SQL Tuning Set (STS) using SQL Performance Analyzer in a test database. Which two statements are true regarding the activities performed during the test execution of SQLs in a SQL Tuning Set?()
A . Every SQL statement in the STS is considered only once for execution.
B . The SQL statements in the STS are executed concurrently to produce the execution plan and execution statistics.
C . The execution plan and execution statistics are computed for each SQL statement in the STS.
D . The effects of DDL and DML are considered to produce the execution plan and execution statistics.
-
You are designing the DNS zone to support the Active Directory domain for Contoso.Ltd. Which two actions should you perform? ()
A . Create ad.contoso.com as a standard primary DNS Zone.
B . Create ad.contoso.com as an Active DirectoryIntegrated DNS Zone.
C . Enable only authorized client computers to update DNS.
D . Configure a zone transfer between the DNS server at the ISP and the DNS servers at Contoso.Ltd.
-
Your company has an Active Directory forest that contains client computers that run Windows Vista and Windows XP. You need to ensure that users are able to install approved application updates on their computers. Which two actions should you perform()
A . Set up Automatic Updates through Control Panel on the client computers.
B . Create a GPO and link it to the Domain Controllers organizational unit. Configure the GPO to automatically search for updates on the Microsoft Update site.
C . Create a GPO and link it to the domain. Configure the GPO to direct the client computers to the Windows Server Update Services (WSUS) server for approved updates.
D . Install the Windows Server Update Services (WSUS). Configure the server to search for new updates on the Internet. Approve all required updates.
-
In an n-tier application, which two invocations are typically remote, not local?()
A . JSP to Transfer Object
B . Service Locator to JNDI
C . Controller to request object
D . Transfer Object to Entity Bean
E . Controller to Business Delegate
-
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()
A . Troubleshooting is more complicated.
B . Service and switch modules are underutilized.
C . Layer 2 adjacency is required with the servers that use this design.
D . Layer 3 adjacency is required with the servers that use this design.
E . Load balancing will always occur across both access layer uplinks.
-
Which two of the following activities are included in the Cisco Unified Communications project closeout()
A . Complete Ongoing Support Handoff Materials
B . Prepare for Handoff Meeting
C . Update Leading Practices
D . Obtain Customer Satisfaction Feedback
-
Which two of the following activities are included in the Cisco Unified Communications staff development()
A . Collect Cisco Unified Communications Training Materials
B . Develop Job Role Training Requirement
C . Request for Training Budget
D . Develop Curriculum Map
E . Develop Informal Basic Training
-
Which two RSTP port roles include the port as part of the active topology?()
A . root
B . designated
C . alternate
D . backup
E . forwarding
F . learning
-
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()
A . Troubleshooting is more complicated.
B . Service and switch modules are underutilized.
C . Layer 2 adjacency is required with the servers that use this design.
D . Layer 3 adjacency is required with the servers that use this design.
E . Load balancing will always occur across both access layer uplinks.
-
You Execute the Following command to create a password file in the database server: $ orapwd file = ‘+DATA/PROD/orapwprod entries = 5 ignorecase = N format = 12’ Which two statements are true about the password file?()
A . It records the usernames and passwords of users when granted the DBA role.
B . It contains the usernames and passwords of users for whom auditing is enabled.
C . Is used by Oracle to authenticate users for remote database administration.
D . It records the usernames and passwords of all users when they are added to the OSDBA or OSOPER operating system groups.
E . It supports the SYSBACKUP, SYSDG, and SYSKM system privileges.
-
Which two activities are NOT supported by the Data Recovery Advisor?()
A . Diagnose and repair a data file corruption offline.
B . Diagnose and repair a data file corruption online.
C . Diagnose and repair failures on a standby database.
D . Recover from failures in the Real Application Cluster (RAC) environment.
-
You executed this command to create a password file: $ orapwd file = orapworcl entries = 10 ignorecase = N Which two statements are true about the password file?()
A . It will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.
B . It contains username and passwords of database users who are members of the OSOPER operating system group.
C . It contains usernames and passwords of database users who are members of the OSDBA operating system group.
D . It will permit the use of lowercase passwords for database users who have granted the SYSDBA role.
E . It will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.
-
Which two statements are correct? Choose two answers.
-
Which of the following are marketing activities?
-
●A program can best be described as:AA grouping of related activities which last two years
● A program can best be described as:
A A grouping of related activities which last two years or more
B The first major subdivision of a project
C A grouping of projects, similar in nature, which support a product or product line and have no definable end point
D A product line
E Another name for a project
-
An administrator needs to authenticate users to the network, authorize network activities, andaccount for activities done.Which of the following are services that will BEST meet these goals?()(Select TWO).
A.TACACS+
B.RADIUS
C.Kerberos
D.802.1X
E.RRAS
-
According to the discussion, governments influence economic activity through which methods? Click on two answers.
A.Taxation
B.Elections
C.Spending
D.Diplomacy
-
Which of these are the 5 generic software engineering framework activities?()
A.A.communication, planning, modeling, construction, deployment
B.B.communication, risk management, measurement, production, reviewing
C.C.analysis, designing, programming, debugging, maintenance
D.D.analysis, planning, designing, programming, testing