-
Which three statements are true about policing?()
A . Out-of-profile packets are queued.
B . It causes TCP retransmits.
C . Marking and remarking are not supported.
D . It does not respond to BECN and foresight messages.
E . It uses a single- and two-bucket mechanism for metering.
-
Which three occur during JSP page translation?()
A . The jspInit method is called.
B . The JSP page implementation class is created.
C . The JSP page implementation class is compiled.
D . The JSP page is validated for syntatic correctness.
E . The associated tag files are validated for syntatic correctness.
-
Which three IP multicast address related statements are true? (Choose three.) ()
A . Multicast addresses 224.0.0.0 through 224.0.0.255 are always forwarded because they are transmitted with Time to Live (TTL) greater than 1.
B . Multicast addresses 224.0.0.5 and 224.0.0.6 are source multicast addresses for OSPF routers.
C . Multicast addresses 224.0.0.13 and 224.0.0.22 are reserved link-local addresses used by PIMv2 and IGMPv3.
D . Because they would map to overlapping IP multicast MAC addresses, multicast addresses 224.0.1.1 and 238.1.1.1 could not be used together.
E . Multicast address 224.0.1.1 has been reserved for the Network Time Protocol (NTP) by the IANA
F . The administratively scoped multicast addresses 239.0.0.0 through 239.255.255.255 are similar in purpose to RFC 1918 private unicast addresses.
-
Which three types of integration does the Business Event System support?() (Choose three.)
A . point-to-point
B . parent/child messaging
C . messaging hub system
D . distributed applications messaging
E . simple object access protocol (SOAP) messaging
-
Which three statements about RSTP are true?()
A . RSTP significantly reduces topology reconverging time after a link failure.
B . RSTP expends the STP port roles by adding the alternate and backup roles.
C . RSTP port states are blocking,discarding,learing,or forwarding.
D . RSTP also uses the STP proprsal-agreement sequence.
E . RSTP use the same timer-baseed process as STP on point-to-point links.
F . RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.
-
Which three of the following are components of a syslog message? ()(Choose three.)
A . time stamp
B . error codes
C . severity level
D . log message name
-
Which three tasks can be performed using a duplicate database? ()(Choose three.)
A . Testing the backup and recovery procedures
B . Testing the upgrade of an Oracle database to a new release
C . Testing the effect of an application changes on database performance
D . Continuously updating archive log files from the target database to support failover
-
Which three are advantages of SONET?()
A . Allows the transportation of all forms of traffic
B . Multiplexing is easy
C . Clocks do not need to be synchronized
D . Reduces network complexity and cost
E . Padding is not necessary and not permitted
-
Which three statements are true?()
A . A final method in class X can be abstract if and only if X is abstract.
B . A protected method in class X can be overridden by any subclass of X.
C . A private static method can be called only within other static methods in class X.
D . A non-static public final method in class X can be overridden in any subclass of X.
E . A public static method in class X can be called by a subclass of X without explicitly referencing the class X.
F . A method with the same signature as a private final method in class X can be implemented in a subclass of X.
G . A protected method in class X can be overridden by a subclass of X only if the subclass is in the same package as X.
-
Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)
A . includes three design levels
B . incorporates products and technologies into enterprise, service provider, and commercial systems
C . extends the value of designs through a sustained development plan
D . does not factor customer input design process
E . facilitates faster and more reliable customer deployments
F . incorporates a narrow range of technologies and product
-
Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()
A . onboard VPN accelerator
B . events correlation and proactive response
C . high-performance AIM VPN modules
D . virtual firewall
E . Cisco lOS Firewall and lOS IPS
F . transparent firewall
-
Which three are Cisco architectures?()
A . cloud computing
B . consumerization
C . collaboration
D . virtualization
E . digital media
F . borderless network
-
Which three statements are true about persistent configuration?() (Choose three.)
A . A user cannot set privileges on the persistent lightweight jobs
B . Persistent lightweight jobs generate a large amount of metadata
C . It is possible to create fully self-contained persistent lightweight jobs
D . The use of a template is mandatory to create persistent lightweight jobs
E . Persistent lightweight jobs are useful when users need to create a large number of jobs in a short time
-
Which three statements are true?()
A . The default constructor initializes method variables.
B . The default constructor has the same access as its class.
C . The default constructor invoked the no-arg constructor of the superclass.
D . If a class lacks a no-arg constructor, the compiler always creates a default constructor.
E . The compiler creates a default constructor only when there are no other constructors for the class.
-
Which three statements are correct about RIP version 2? (Choose three.)()
A . It has the same maximum hop count as version 1.
B . It uses broadcasts for its routing updates.
C . It is a classless routing protocol.
D . It has a lower default administrative distance than RIP version 1.
E . It supports authentication.
F . It does not send the subnet mask in updates.
-
Which three operations require undo data()
A . committing a transaction
B . flashing back a transaction
C . recovering a failed transaction
D . running a read-consistent query
E . changing a tablespace status from READ ONLY to READ WRITE
-
Which three are true? ()
A . A MERGE statement is used to merge the data of one table with data from another.
B . A MERGE statement replaces the data of one table with that of another.
C . A MERGE statement can be used to insert new rows into a table.
D . A MERGE statement can be used to update existing rows in a table.
-
Which three actions are allowed in event details? ()(Choose three.)
A . Send
B . Raise
C . Delete
D . Receive
E . Acknowledge
-
Which three of these items are IPv6 transition mechanisms? ()(Choose three.)
A . ISATAP
B . NATV6
C . manually configured overlay tunnels
D . dual stack configuratio
-
Which three WLAN statements are true? (Choose three.) ()
A . A lightweight AP receives control and configuration from a WLAN controller to which it is associated.
B . A WLAN client that is operating in half-duplex mode will delay all clients in that WLAN
C . A dhoc mode allows mobile clients to connect directly without an intermediate AP
D . Another term for infrastructure mode is independent service set (IBSS)
E . The Aironet 1230 access point is an example of an access point that operates solely as a lightweight access point.
F . WLANs are designed to share the medium and can easily handle an increased demand of channel contention.
-
Which three functions are performed by the SQL Tuning Advisor?() (Choose three.)
A . Building the SQL profile
B . Recommending optimization of materialized views
C . Checking query objects for missing and stale statistics
D . Recommending bitmap, function-based, and B-tree indexes
E . Recommending restructuring SQL queries that are using bad pla
-
Which three timing modes are supported on the ONS 15454 shelf? ()(Choose three.)
A . line timing
B . loop timing
C . internal timing
D . through timing
E . external timing
-
Which three MPLS statements are true?()
A . Cisco Express Forwarding (CEF) must be enabled as a prerequisite to running MPLS on a Cisco router.
B . Frame-mode MPLS inserts a 32-bit label between the Layer 3 and Layer 4 headers.
C . MPLS is designed for use with frame-based Layer 2 encapsulation protocols such as Frame Relay, but is not supported by ATM because of ATM fixed-length cells.
D . OSPF, EIGRP, IS-IS, RIP, and BGP can be used in the control plane.
E . The control plane is responsible for forwarding packets.
F . The two major components of MPLS include the control plane and the data plane.