-
Which two implementations are standard Virtual Private LAN Service (VPLS) implementations that aresupported by the IETF?()
A . VPLS uses LDP for signaling.
B . VPLS uses BGP for autodiscovery and signaling.
C . VPLS uses extended IS-IS for signaling
D . VPLS uses OSPF version 3 for auto discovery and signaling
E . VPLS uses spanning tree for signaling
-
What are two design guidelines for VoIP networks? ()
A . Delay should be no more than 10 ms.
B . Loss should be no more than1 percent.
C . Jitter should be less then 40 ms.
D . Managed bandwidth is strongly recommended for voice control traffic.
-
Cisco RFID-Ready Networks support().
A . tracking tagged items across an enterprise
B . access to enterprise networks from different service areas
C . standards-based communications for multiple media types
D . extensive functionality for large enterprise
-
关于/etc/networks文件的说法正确的有()。
A . /etc/networks文件中存放网络列表,一般都把所有用到的网络号都放在这个表中
B . “training 129.6 XYW1 xyw2 #TEST CENTRE”是一句非法的记录
C . “huawei 129.9 #huawei tech. co. ltd.”,是一句合法记录,并说明网络“huawei”的网络号为“129.9”
D . 任何一个/etc/networks文件都有loopback这个网络名
-
苗网(networks loops)
-
Which statement is true regarding virtual private catalogs?()
A . A virtual private catalog owner can create a local stored script, and have read/write access to a global stored script.
B . The virtual private catalog owner cannot create and modify the stored scripts.
C . The set of views and synonyms that make up the virtual private catalog is stored in the schema of the RMAN recovery catalog owner.
D . To perform most of the RMAN operations, the virtual catalog owner must have the SYSDBA or SYSOPER privilege on the target database
-
You want to create the Recovery Manager (RMAN) Virtual Private Catalog (VPC) to maintain a separation of responsibilities along with a consolidation of RMAN repository. Which condition must be met before you create the VPC?()
A . A base catalog exists
B . The recovery catalog is empty
C . The base recovery catalog must be dropped
D . A target database is registered in the recovery catalog
-
Which statement is true regarding virtual private catalogs? ()
A . A virtual private catalog owner can create a local stored script, and have read/write access to a global stored script.
B . The virtual private catalog owner cannot create and modify the stored scripts.
C . The set of views and synonyms that make up the virtual private catalog is stored in the schema of the RMAN recovery catalog owner.
D . To perform most of the RMAN operations, the virtual catalog owner must have the SYSDBA or SYSOPER privilege on the target database.&e
-
VPN即Virtual Private Network虚拟私用网,是利用Internet来传输()而形成的逻辑网络。
-
Which of the following Class A networks is reserved for "private networks" use only?()
A . network 10.0.0.0
B . network 127.0.0.0
C . network 129.135.0.0
D . network 192.168.0.0
-
You want to create the Recovery Manager (RMAN) Virtual Private Catalog (VPC) to maintain a separation of responsibilities along with a consolidation of RMAN repository. Which condition must be met before you create the VPC?()
A . A base catalog exists
B . The recovery catalog is empty
C . The base recovery catalog must be dropped
D . A target database is registered in the recovery catalog
-
Cisco Configuration Assistant supports a variety of virtual private networks. Which three types of VPN can be configured by using CCA?()
A . DMVPN
B . MPLS VPN
C . IPv6 VPN
D . Cisco IOS SSL VPN
E . site-to-site VPN
F . Cisco Easy VPN
-
What are two design guidelines for VoIP networks?()
A . Delay should be no more than 10 ms.
B . Loss should be no more than 1 percent.
C . Jitter should be less then 40 ms.
D . Managed bandwidth is strongly recommended for voice control traffic.
-
Which statement is true regarding virtual private catalogs?()
A . A virtual private catalog owner can create a local stored script, and have read/write access to a global stored script.
B . The virtual private catalog owner cannot create and modify the stored scripts.
C . The set of views and synonyms that make up the virtual private catalog is stored in the schema of the RMAN recovery catalog owner.
D . To perform most of the RMAN operations, the virtual catalog owner must have the SYSDBA or SYSOPER privilege on the target database.
-
You have a Windows Server 2008 R2 Hyper-V server with two network adapters named Adapter1 and Adapter2. You need to configure the server to host virtual machines (VMs) on different networks. Which two actions should you perform on the host server?()
A . Set Adapter1 as a management interface.
B . Configure Adapter1 to support jumbo frames.
C . Set Adapter2 in Trunk mode, and configure VM VLAN tags.
D . Disable TCP Chimney support on Adapter2, and configure VM VLAN tags.
-
You have a Windows Server 2008 R2 Hyper-V server with two network adapters named Adapter1 and Adapter2. You need to configure the server to host virtual machines (VMs) on different networks. Which two actions should you perform on the host server?()
A . Set Adapter1 as a management interface.
B . Configure Adapter1 to support jumbo frames.
C . Set Adapter2 in Trunk mode, and configure VM VLAN tags.
D . Disable TCP Chimney support on Adapter2, and configure VM VLAN tags.
-
Your portable computer has a Virtual Private Network (VPN) connection configured. You need to connect to the VPN.
What should you do?()
https://assets.asklib.com/images/image2/2018073115210636836.jpg
A . A
B . B
C . C
D . D
-
Your portable computer has a Virtual Private Network (VPN) connection configured. You need to connect to the VPN. What should you do?()
A . Use the Mobile PC program.
B . Use the Ease of Access program.
C . Use the System and Maintenance program.
D . Use the Network and Sharing Center program.
-
How would you grant the RVPC user access to specific RMAN database records in the RMAN virtual private catalog?()
A . Issue the grant command from the SYS user (or equivalent) of the target database.
B . Issue the grant command from the SYS user (or equivalent) of the recovery-catalog database.
C . Issue the grant command from the recovery catalog-owning schema user account in the recovery catalog.
D . Issue the grant command from RMAN when connected to the recovery catalog-owning schema.
E . Issue the grant command from RMAN when connected to the target database.
-
Wireless networks need more protection.
-
Examine the following commands for redefining a table with Virtual Private Database (VPD) policies:Which two statements are true about redefining the table?()
<img src='https://img2.soutiyun.com/shangxueba/ask/64224001-64227000/64224740/398a37009eba261eceebfd5a001edaba.png' />
<img src='https://img2.soutiyun.com/shangxueba/ask/64224001-64227000/64224740/a5add098aa6143b225044036df53c199.png' />
A. All the triggers for the table are disabled without changing any of the column names or column types in the table.
B. The primary key constraint on the EMPLOYEES table is disabled during redefinition.
C. VPD policies are copied from the original table to the new table during online redefinition.
D. You must copy the VPD policies manually from the original table to the new table during online redefinition.
-
You want to create the Recovery Manager (RMAN) Virtual Private Catalog (VPC) to maintain a
You want to create the Recovery Manager (RMAN) Virtual Private Catalog (VPC) to maintain a separation of responsibilities along with a consolidation of RMAN repository.Which condition must be met before you create the VPC?()
A. A base catalog exists
B. The recovery catalog is empty
C. The base recovery catalog must be dropped
D. A target database is registered in the recovery catalog
-
InfraGard is a grass roots effort to respond to the need for cooperation and collaboration in countering the threat of cyber crime and terrorism to private businesses and the government. By the end of September, there will be InfraGard chapters in all 50 states, Calloway said. With advice from the FBI, each local chapter will be run by a board of directors that includes members of private industry, the academic community and public agencies. Banks, utilities, and other businesses and government agencies will use a secure Web site to share information about attempts to hack into their computer networks. Members can join the system free. A key feature of the system is a two-pronged method of reporting attacks.
A "sanitized" description of a hacking attempt or other incident--one that doesn't reveal the name or information about the victim--can be shared with the other members to spot trends. Then a mote detailed description also can be sent to the FBI's computer crimes unit to interfere if there are grounds for an investigation. Cyber crime has jumped in recent years across the nation, particularly in hotbeds of financial commerce and technology like Charlotte. "Ten years ago, all you needed to protect yourself was a safe, a fence and security officers," said Chris Swecker, who is in charge of the FBI's Charlotte office. "Now any business with a modem is subject to attack." FBI agents investigate computer hacking that disrupted popular Web sites including Amazon. com, CNN and Yahoo!
Several North Carolina victims have been identified this year. The investigation has also identified computer systems in North Carolina used by hackers to commit such attacks. Prosecutions of hackers have been hampered by the reluctance of companies to report security intrusions for fear of bad publicity and lost business. Meanwhile, too many corporations have made it too easy for criminals by sacrificing security for speed and accessibility. Jack Wiles, who will lead the local InfraGard chapter's board, said a recent report estimated 97 percent of all cyber crime goes undetected. Wiles, a computer security expert, has a firewall on his personal computer to prevent hackers from getting into his files. "I get at least one report a day that somebody was trying to get into my computer," he said, "the Net is a wonderful place, but it's also a dangerous one.
From the first paragraph, we know ______.
A.InfraGard is a protective measure against cyber crime
B.InfraGard is a measure of cooperation and collaboration
C.there will be 50 InfraGard chapters in all states
D.private business and the government are now committing cyber crime
-
部署互联网协议安全虚拟专用网(Internet Protocol Security Virtual Private Network,IPsecVPN)时,以下说法正确的是()
A.配置MD5安全算法可以提供可靠地数据加密
B.配置AES算法可以提供可靠的数据完整性验证
C.部署IPsecVPN网络时,需要考虑IP地址的规划,尽量在分支节点使用可以聚合的IP地址段,来减少IPsec安全关联(Security Authentication,SA)资源的消耗
D.报文验证头协议(Authentication Header,AH)可以提供数据机密性