-
Which statement describes the ROWID data type? ()
A . Binary data up to 4 gigabytes.
B . Character data up to 4 gigabytes.
C . Raw binary data of variable length up to 2 gigabytes.
D . Binary data stored in an external file, up to 4 gigabytes.
E . A hexadecimal string representing the unique address of a row in its table.
-
Which two statements best describe EtherChannel?()
A . EtherChannel technology helps aggregate traffic grouping multiple,full-duplex point-to-point linkstogether
B . EtherChannel technology is based on the 802.1 IEEE stand
C . EtherChannel can aggregate up to 800 Mbps,8 Gbps,or Gbps of aggregate bandwidth for a Fast EtherChannel,Gigabit EtherChannel,or 10 Gigabit EtherChannel connection respectively
D . EtherChannel is defined for Rapid Spanning Tree for faster convergence
-
Which of these statements best describes VPLS?()
A . Neither broadcast nor multicast traffic is ever flooded in VPLS.
B . Multicast traffic is flooded but broadcast traffic is not flooded in VPLS.
C . VPLS emulates an Ethernet switch, with each EMS being analogous to a VLAN.
D . Because U-PE devices act as IEEE 802.1 devices, the VPLS core must use STP.
E . When the provider experiences an outage, IP re-routing restores PW connectivity and MAC re-learning is needed.
-
Which statement best describes echo?()
A . Echo is the discernable leak-through of your own Rx path into your own Tx path.
B . Echo is the discernable leak-through of the packets of your Rx path into your own Tx path.
C . Echo is the nonaudible leak-through of the packets of your Rx path into your own Tx path.
D . Echo is the audible leak-through of the packets from the transmit path into your own receive path.
E . Echo is the nonaudible leak-through of the packets of your Tx path into your own Rx path.
-
Which two statements correctly describe VTP?()
A . Transparent mode always has a configuration revision number of 0.
B . Transparent mode cannot modify a VLAN database.
C . Client mode cannot forward received VTP advertisements.
D . Client mode synchronizes its VLAN database from VTP advertisements.
E . Server mode can synchronize across VTP domains.
-
What best describes an FXO interface?()
A . analog trunks that provide the Survivable Remote Site Telephony (SRST) feature
B . analog trunks that provide VoIP gateway functionality
C . analog trunks that connect a gateway to plain old telephone service (POTS) device such as analog phones, fax machines, and legacy voice-mail systems
D . analog trunks that connect a gateway to a central office (CO) or private branch exchange (PBX)
-
Which two statements describe traffic policing?()
A . Traffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of data
B . Excess traffic is buffered so that the traffic remains within the desired rate.
C . Packets that conform to traffic policies are not delayed.
D . Packet marking is available and allows excess packets to be re-marked with a lower priorit
-
Which two statements best describe CBWFQ?()
A . The CBWFQ scheduler provides a guaranteed minimum amount of bandwidth to each class.
B . CBWFQ services each class queue using a strict priority scheduler.
C . The class-default queue only supports WFQ.
D . Inside a class queue, processing is always FIFO, except for the class-default queue.
-
Which two statements accurately describe a role?()
A . A role can be given to a maximum of 1000 users.
B . A user can have access to a maximum of 10 roles.
C . A role can have a maximum of 100 privileges contained in it.
D . Privileges are given to a role by using the CREATE ROLE statement.
E . A role is a named group of related privileges that can be granted to the user.
F . A user can have access to several roles, and several users can be assigned the same role.
-
What best describes processing delay?()
A . the time required from receipt of the incoming frame, until the frame/packet has been queued for transmission
B . the time taken for a single packet to traverse the physical medium from one end to the other
C . the time taken to place a frame on the physical medium for transport
D . the time spent for a packet to reside in the output queue of a router
-
Which statement describes the Authentication Proxy feature?()
A . All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
B . A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
C . Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
D . The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.
-
Which statements describe the routing protocol OSPF?()
A . It supports VLSM.
B . It is used to route between autonomous systems.
C . It confines network instability to one area of the network.
D . It increases routing overhead on the network.
E . It allows extensive control of routing updates.
F . It is simpler to configure than RIP v2.
-
Which best describes an inline view? ()
A . a schema object
B . a subquery that can contain an ORDER BY clause
C . another name for a view that contains group functions
D . a subquery that is part of the FROM clause of another query
-
描述函数(describing function)
-
Which of the following describe router functions?()
A . Packet switching
B . Collision prevention on a LAN segment
C . Packet filtering
D . Broadcast domain enlargement
E . Broadcast forwarding
F . Internetwork communicatio
-
Which statements describe the routing protocol OSPF?()
A . It supports VLSM.
B . It is used to route between autonomous systems.
C . It confines network instability to one area of the network.
D . It increases routing overhead on the network.
E . It allows extensive control of routing updates.
F . It is simpler to configure than RIP v2.
-
Which of these statements best describes VPLS?()
A . Neither broadcast nor multicast traffic is ever flooded in VPLS.
B . Multicast traffic is flooded but broadcast traffic is not flooded in VPLS.
C . VPLS emulates an Ethernet switch, with eachEMS being analogous to a VLAN.
D . Because U-PE devices act as IEEE 802.1 devices, the VPLS core must use STP.
E . When the provider experiences an outage, IP re-routing restores PW connectivity and MAC relearning is needed.
-
Which statement describes Reverse Route Injection (RRI)?()
A . A static route that points towards the Cisco Easy VPN server is created on the remote client.
B . A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.
C . A default route is injected into the route table of the remote client.
D . A default route is injected into the route table of the Cisco Easy VPN server.
-
The novel Sister Carrie describes()
A . the death of Hurstwood
B . the degeneration of Carrie Meeber
C . how Carrie climbed up the social ladder
D . Carrie.s love affair with Drouet
-
What best describes an anchor buoy().
A . A black ball that is hoisted when the ship anchors
B . A buoy attached to the anchor
C . A buoy attached to the scope of an anchor chain
D . A mark of the number of fathoms in an anchor chai
-
How would you describe the three speakers?
-
Which of the following CANNOT describe multiculturalism?
-
Why did the tribe from Central Africa describe the picture differently from how you or I would describe the photo?
-
Communications is best described as:
A an exchange of information.
B providing written or oral directions.
C consists of senders and receivers
D effective listening.
E All of the above