-
Which two of these are correct regarding access control lists? (Choose two.) ()
A . An ACL can be applied to multiple interlaces.
B . An ACL wildcard mask is identical to an IP subnet mask.
C . There may be multiple ACLs per protocol, per direction, and per interface.
D . There is an "implicit deny" at the end of an ACL and will result in a dropped packet.
E . An ACL acts on all packets, those flowing thru the router and those originated by the router itself.
F . An ACL will be processed from top to bottom and may have multiple matches that will act on the packet that is being tested.
-
Which two statements are correct about database transportation?() (Choose two.)
A . The source and target platforms must be the same
B . Redo logs, control files and temp files are also transported
C . The transported database must have the same database identifier (DBID) as the source database and cannot be changed
D . The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transported
E . Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format
-
Which two statements are true about encrypting RMAN backup?() (Choose two.)
A . The transparent encryption of backups uses the encryption wallet
B . The database uses the same encryption key for every encrypted backup
C . The password encryption of backups only uses the password while creating and restoring backup
D . If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
-
Which two are the prerequisites to enable Flashback Data Archive?() (Choose two.)
A . Database must be running in archivelog mode.
B . Automatic undo management must be enabled.
C . Undo retention guarantee must be enabled.
D . The tablespace on which the Flashback Data Archive is created must be managed with Automatic Segment Space Management (ASSM).
-
Which two are equivalent? ()
A . 16>4
B . 16/2
C . 16*4
D . 16>>2
E . 16/2^2
F . 16>>>2
-
Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()
A . 802.1X
B . Cisco Temporal Key Integrity Protocol (CKIP)
C . Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)
D . Cisco Message Integrity Check (CMIC)
E . One-Time Passwords (OTP)
F . Advanced Encryption Standard (AES)
-
Which command will assign the last usable IP address from the 192.168.32.128/28 subnetwork to a router interface?()
A . TestKingA(config-if)# ip address 192.168.32.142 255.255.255.240
B . TestKingA(config-if)# ip address 192.168.32.143 255.255.255.240
C . TestKingA(config-if)# ip address 192.168.32.158 255.255.255.240
D . TestKingA(config-if)# ip address 192.168.32.145 255.255.255.240
E . TestKingA(config-if)# ip address 192.168.32.144 255.255.255.240
-
Which two are equivalent?()
A . 3/2
B . 3<2
C . 3*4
D . 3<<2
E . 3*2^2
F . 3<<<2
-
Which two are equivalent?()
A . 3/2
B . 3<2
C . 3*4
D . 3<<2
E . 3*2^2
F . 3<<<2
-
The TestKing network is subnetted using 29 bits for the subnet mask. Which wild card mask should be used to configure an extended access list to permit or deny access to an entire subnetwork?()
A . 255.255.255.224
B . 255.255.255.248
C . 0.0.0.224
D . 0.0.0.8
E . 0.0.0.7
F . 0.0.0.3
-
Which two statements are true about network voice traffic? (Choose two.)()
A . Voice traffic is affected more by link speed than FTP traffic is.
B . Voice traffic is affected more by packet delays than FTP traffic is.
C . Voice streams involve larger packet sizes than most TCP network traffic involves.
D . Voice traffic is more sensitive to packet loss than TCP network traffic is.
E . Voice traffic requires QOS mechanisms only in heavily loaded network segments.
-
Which two subnetworks would be included in the summarized address of 172.31.80.0 /20?()
A . 172.31.17.4/30
B . 172.31.51.16/30
C . 172.31.64.0/18
D . 172.31.80.0/22
E . 172.31.92.0/22
F . 172.31.192.0/18
-
Which two statements are true?()
A . It is possible for more than two threads to deadlock at once.
B . The JVM implementation guarantees that multiple threads cannot enter into a deadlocked state.
C . Deadlocked threads release once their sleep() method’s sleep duration has expired.
D . Deadlocking can occur only when the wait(), notify(), and notifyAll() methods are used incorrectly.
E . It is possible for a single-threaded application to deadlock if synchronized blocks are used incorrectly.
F . If a piece of code is capable of deadlocking, you cannot eliminate the possibility ofdeadlocking by insertinginvocations of Thread.yield().
-
Which two choices are equivalent?()
A . 16 > 4
B . 16 / 2
C . 16 * 4
D . 16 >> 2
E . 16 / 22
F . 16 >>> 2
-
Which two multicast protocol statements are true? (Choose two.) ()
A . Dense mode multicast requires explicit join messages from their members.
B . Dense mode multicast uses a push model to flood traffic throughout the network and then prunes the unwanted traffic.
C . Sparse mode multicast uses a pull model to send multicast traffic to where it is requested.
D . Sparse mode uses reverse path forwarding (RPF) to prune off redundant flows.
E . The primary use of sparse mode multicast is for test labs and router performance testing.
-
Which are the two options to which a menu can be assigned?() (Choose two.)
A . menu
B . functions
C . data group
D . responsibility
E . functional grou
-
Which two are true?()
A . An encapsulated, public class promotes re-use.
B . Classes that share the same interface are always tightly encapsulated.
C . An encapsulated class allows subclasses to overload methods, but does NOT allow overriding methods.
D . An encapsulated class allows a programmer to change an implementation without affecting outside code.
-
Which two statemets are true?()
A . DPT/RPR uses a bi-directional ring consisting of two symmetric counter rotating fibre rings.
B . DPT/RPR is defined in the IEEE 802.17 standard and it uses Token Bucket system to avoid collisions on the fiber.
C . In DPT/RPR rings, data packets can be sent in one direction (downstream) and the corresponding control packets in the opposite direction (upstream),thus using both fibres concurrently to maximise bandwidth.
D . DPT/RPR can be deployed in the Core of the SP networks where point-to-point POS links are used tomake best use of the Bandwidth.
-
Which two statements are true?()
A . It is possible for more than two threads to deadlock at once.
B . The JVM implementation guarantees that multiple threads cannot enter into a deadlocked state.
C . Deadlocked threads release once their sleep() method's sleep duration has expired.
D . Deadlocking can occur only when the wait(), notify(), and notifyAll() methods are used incorrectly.
E . It is possible for a single-threaded application to deadlock if synchronized blocks are used incorrectly.
F . If a piece of code is capable of deadlocking, you cannot eliminate the possibility of deadlocking by inserting invocations of Thread.yield().
-
Which two are true?()
A . A finalizer may NOT be invoked explicitly.
B . The finalize method declared in class Object takes no action.
C . super.finalize()is called implicitly by any over riding finalize method.
D . The finalize method for a given objec twill be called no more than once by the garbage collector.
E . The order in which finalize will be called on two objects is based on the order in which the two objects became finalizable.
-
Which two statements are true about a job chain? ()(Choose two.)
A . A job chain can contain a nested chain of jobs.
B . The jobs in a job chain cannot have more than one dependency.
C . A job of the CHAIN type can be run using event-based or time-based schedules.
D . The jobs in a job chain can be executed only by using the events generated by the Scheduler
-
Explain two ways in which public speaking and conversation differ, and two ways in which they are similar.
-
Which two statements are correct? Choose two answers.