What are three actions performed by the mysql_secure_installation tool?()
A . It prompts you to set the root user account password
B . It checks whether file permissions are appropriate within datadir
C . It asks to remove the test database, which is generated at installation time
D . It can delete any anonymous accounts
E . It verifies that all users are configuration with the longer password hash
-
What are three Cisco Unified CallManager features? ()
A . programming interface to external applications
B . FXS and FXO port negotiation
C . AutoQos VoIP trust boundaries
D . signaling and device control
E . LLQ for voice and video traffic
F . directory and XML service
-
What are three benefits of implementing vlans?()
A . A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure
B . Broadcast storms can be mitigated by decreasing the number of broadcast domains,thus increasing their size.
C . A higher level of network security can be reached by separating sensitive data traffic from other network traffic.
D . Port-based vlans increase switch-port use efficient,thanks to 802.1Q trunks
E . A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure.
F . Broadcast storms can be mitigated by increasing the number of broadcast domains,thus reducing their size.
G . VLANs make it easier for IT staff to configure new logical groups,because the vlans all belong to the same broadcast domain.
-
What are three IPv6 transition mechanisms?()
A . 6to4 tunneling
B . VPN tunneling
C . GRE tunneling
D . ISATAP tunneling
E . PPP tunneling
F . Teredo tunneling
-
What are three benefits of GLBP?()
A . GLBP supports up to eight virtual forwarders per GLBP group
B . GLBP supports clear text and MD5 password authentication between GLBP group members
C . GLBP is an open source standardized protocol that can be used with multiple vendors
D . GLBP supports up to 1024 virtual routers
E . GLBP can load share traffic across a maximum of four routers
F . GLBP elects two AVGs and two standby AVGs for redundancy
-
You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()
A . Import the user accounts as inetOrgPerson objects.
B . Import the user accounts into Active Directory by using the Ldifde command-line tool.
C . Export all user accounts from the UNIX servers to a text file.
D . Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.
E . Assign random passwords to each user object, and securely distribute the password to the users.
F . Create the same strong password for each user object, and require users to change their passwords at first logon.
G . Instruct users to use the same name and password as they used on the UNIX servers.
-
You need to ensure that users who enter three successive invalid passwords within 5 minutes are locked out for 5 minutes. Which three actions should you perform()
A . Set the Minimum password age setting to one day.
B . Set the Maximum password age setting to one day.
C . Set the Account lockout duration setting to 5 minutes.
D . Set the Reset account lockout counter after setting to 5 minutes.
E . Set the Account lockout threshold setting to 3 invalid logon attempts.
F . Set the Enforce password history setting to 3 passwords remembered.
-
What are three uses for record groups?()
A . To pass data to a pop-up menu.
B . To populate a base table block.
C . To pass data to other form modules.
D . To pass data to other Oracle products.
E . To dynamically construct SELECT statements.
F . To server as the source for a FROM clause query.&e
-
What are three advantages of VLANs?()
A . VLANs establish broadcast domains in switched networks.
B . VLANs utilize packet filtering to enhance network security.
C . VLANs provide a method of conserving IP addresses in large networks.
D . VLANs provide a low-latency internet working alternative to routed networks.
E . VLANs allow access to network services based on department, not physical location.
F . VLANs can greatly simplify adding, moving, or changing hosts on the network.
-
What are the three main parts of a syslog message? ()(Choose three.)
A . severity level
B . facility
C . log message name
D . time stamp
E . error codes
F . access privilege
-
What are three facts control plane policing? ()
A . a set of rules that can be established and associated with the ingress and egress ports of the control plane
B . improves performance of the control plane by marking control plane packets with DSCPEF
C . protects the control plane on a router from DoS attacks
D . treats the control plane as a separate entity with its own ingress (input) and egress (output) ports
E . provides the control plane with a separate token bucket
F . enhances security of the control plane by tunneling packets to and from the control plane
-
What are three IPv6 transition mechanisms?()
A . 6to4 tunneling
B . VPN tunneling
C . GRE tunneling
D . ISATAP tunneling
E . PPP tunneling
F . Teredo tunneling
-
Which three actions are allowed in event details? ()(Choose three.)
A . Send
B . Raise
C . Delete
D . Receive
E . Acknowledge
-
You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()
A . Import the user accounts as inetOrgPerson objects.
B . Import the user accounts into Active Directory by using the Ldifde command-line tool.
C . Export all user accounts from the UNIX servers to a text file.
D . Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.
E . Assign random passwords to each user object, and securely distribute the password to the users.
F . Create the same strong password for each user object, and require users to change their passwords at first logon.&e
-
What are three benefits of implementing vlans?()
A . A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure
B . Broadcast storms can be mitigated by decreasing the number of broadcast domains,thus increasing their size
C . A higher level of network security can be reached by separating sensitive data traffic from other network traffic
D . Port-based vlans increase switch-port use efficient,thanks to 802.1Q trunks
E . A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure
F . Broadcast storms can be mitigated by increasing the number of broadcast domains,thus reducing theirsize
G . VLANs make it easier for IT staff to configure new logical groups,because the vlans all belong to thesame broadcast domai
-
Which three actions are required to configure the Flashback Database?()
A . set Flash Recovery Area
B . enable Flashback logging
C . create FLASHBACK tablespace
D . start the database in the ARCHIVELOG mode
E . start the database in the NOARCHIVELOG mode
-
What are three benefits of using ASM?()
A . Ease of disk administration and maintenance
B . Load balancing across physical disks
C . Software RAID-1 data redundancy with double or triple mirrors
D . Automatic recovery of failed disk
-
What are three Cisco Unified CallManager features?()
A . programming interface to external applications
B . FXS and FXO port negotiation
C . AutoQos VoIP trust boundaries
D . signaling and device control
E . LLO for voice and video traffic
F . directory and XML service
-
What are three advantages of VLANs?()
A . VLANs establish broadcast domains in switched networks.
B . VLANs utilize packet filtering to enhance network security.
C . VLANs provide a method of conserving IP addresses in large networks.
D . VLANs provide a low-latency internetworking alternative to routed networks.
E . VLANs allow access to network services based on department,not physical location.
F . VLANs can greatly simplify adding,moving,or changing hosts on the network.
-
What are three relevant design considerations when using the 15216 EDFA? ()(Choose three.)
A . dispersion
B . Optical SNR
C . span attenuation
D . four wave mixing
E . receiver sensitivity
-
What are the three Mongolian manly sports ?
-
What are the three boys doing tonight?
-
What are the three Mongolian manly sports?
-
What are the three workers doing?
-
What are three great mountains in China?