-
Which two statements about the Cisco AutoSecure feature are true?()
A . All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.
B . Cisco123 would be a valid password for both the enable password and the enable secret commands.
C . The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.
D . For an interactive full session of AutoSecure, the auto secure login command should be used.
E . If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.
-
Which two statements about the Wireless Location Appliance are true? ()
A . A Wireless Location Appliance acts as a server to one or more Cisco WCSs. It collects, stores, and passes on data from its associated Cisco WLAN controllers.
B . Before using the Web interface, the initial configuration of the Wireless Location appliance must be done using the command-line interface (CLI).
C . The Cisco 2000, 2700, 4100, and 4400 are examples of Wireless Location Appliances.
D . The Wireless Location Appliance visually displays the location information of WLAN devices and forwards this information to third-party applications using the Simple Network Management Protocol (SNMP).
E . The Wireless Location Appliance visually tracks up to 15,000 WLAN devices and can store this information for 90 days.
-
Which two statements are true about the function of CAC? ()
A . CAC provides guaranteed voice quality on a link.
B . CAC artificially limits the number of concurrent voice calls.
C . CAC is used to control the amount of bandwidth that is taken by a call on a link.
D . CAC prevents oversubscription of WAN resources that is caused by too much voice traffic.
E . CAC allows an unlimited number of voice calls while severely restricting, if necessary, other forms of traffic.
F . CAC solves voice congestion problems by using QoS to give priority to UDP traffic.
-
Which two statements about the DiffServ model are true?()
A . a class can be identified as a single application, multiple applications with similar service needs,or be based on the source or destination IP address
B . a drawback of the DiffServ field in the MAC header to mark frames into behavior aggregates (BAs)
C . DiffServ uses the DiffServ field in the MAC header to mark frames into behavior
D . the DiffServ field occupies the same eight bits of the MAC header that were previously used for the ToS field
E . the first six high-order bits of the DiffServ field are used to identify the Resource Reservation Protocol (RSVP) value
F . the primary goal of DiffServ is scalability
-
Which two statements are true regarding the ORDER BY clause?()
A . The sort is in ascending by order by default.
B . The sort is in descending order by default.
C . The ORDER BY clause must precede the WHERE clause.
D . The ORDER BY clause is executed on the client side.
E . The ORDER BY clause comes last in the SELECT statement.
F . The ORDER BY clause is executed first in the query execution.
-
Which two statements are true regarding the ORDER BY clause? ()
A . It is executed first in the query execution
B . It must be the last clause in the SELECT statement
C . It cannot be used in a SELECT statement containing a HAVING clause
D . You cannot specify a column name followed by an expression in this clause
E . You can specify a combination of numeric positions and column names in this clause
-
Which two statements are true about the WebLogic Server domains ? ()
A . Application Programmers need to refer to domains in their Oracle Web`logic Server programming Interface
B . domains can be used to separate development, test, and production application, administration and operational responsibility, and organizational or business division
C . one can share a configured resource or subsystem between domains
D . the concept of multiple domains is supported&e
-
Which two statements are true about the Automatic Diagnostic Repository (ADR)?() (Choose two.)
A . The ADR base keeps all diagnostic information in binary format
B . SQL*Plus provides the ADRI script, which can be used to work with ADR
C . The ADR can be used for problem diagnosis only when the database is open
D . The ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to null
E . The ADR can be used for problem diagnosis even when the database instance is down
F . The ADR base is shared across multiple instance
-
Which the two about WAR files are true?()
A . WAR files must be located in the web application library directory.
B . WAR files must contain the web application deployment descriptor.
C . WAR files must be created by using archive tools to designed specifically for that purpose.
D . The web container must serve the content of any META-INF directory located in a WAR file.
E . The web container must allow access to resources in JARs in the web application library directory
-
Which two statements are true about the hashCode method?()
A . The hashCode method for a given class can be used to test for object equality and object inequality for that class.
B . The hashCode method is used by the java.util.SortedSet collection class to order the elements within that set.
C . The hashCode method for a given class can be used to test for object inequality, but NOT objecte quality, for that class.
D . The only important characteristic of the values returned by a hashCode method is that the distribution of values must follow a Gaussian distribution.
E . The hashCode method is used by the java.util.HashSet collection class to group the elements within that set into hash buckets for swift retrieval.
-
Which two statements are true about the implementation of QoS? ()
A . Implementing DiffServ involves the configuration of RSVP.
B . Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices.
C . Implementing IntServ involves the utilization of RSVP.
D . Traffic should be classified and marked by the core network devices.
E . Traffic should be classified and marked as close to the edge of the network as possible.
-
Which two statements about the DiffServ QoS model are true?()
A . DiffServ requires RSVP to set up a path through the network to accommodate the requested QoS.
B . Network traffic is identified by class, and the level of service is chosen for each class.
C . The DiffServ model relies on a fairly simple mechanism to provide QoS over a wide range of equipment.
D . RSVP enables the DiffServ model to provide end-to-end QoS.
E . The DiffServ model is more scalable than the IntServ model.
F . The flow-based approach of the DiffServ model is ideal for large scalable implementations such as the public Internet.
-
Which two statements are true regarding the SQL Repair Advisor?()
A . The SQL Repair Advisor can be invoked to tune the performance of the regressed SQL statements.
B . The SQL Repair Advisor can be invoked even when the incident is not active for a SQL statement crash.
C . The SQL Repair Advisor is invoked by the Health Monitor when it encounters the problematic SQL statement.
D . The DBA can invoke the SQL Repair Advisor when he or she receives an alert generated when a SQL statement crashes and an incident is created in the ADR.
-
Which two statements are true regarding the SQL Repair Advisor?()
A . The SQL Repair Advisor can be invoked to tune the performance of the regressed SQL statements.
B . The SQL Repair Advisor can be invoked even when the incident is not active for a SQL statement crash.
C . The SQL Repair Advisor is invoked by the Health Monitor when it encounters the problematic SQL statement.
D . The DBA can invoke the SQL Repair Advisor when he or she receives an alert generated when a SQL statement crashes and an incident is created in the ADR.
-
Which the following two statements are true?()
A . An inner class may be declared as static.
B . An anonymous inner class can be declared as public.
C . An anonymous inner class can be declared as private.
D . An anonymous inner class can extend an abstract class.
E . An anonymous inner class can be declared as protected.
-
Which two statements about the DiffServ model are true? ()
A . A class can be identified as a single application, multiple applications with similar service needs, or be based on the source or destination IP addresses.
B . A drawback of the DiffServ model is that it does not provide backward compatibility with devices that can only use the ToS field.
C . DiffServ uses the DiffServ field in the MAC header to mark frames into behavior aggregates (BAs).
D . The DiffServ field occupies the same eight bits of the MAC header that were previously used for the ToS field.
E . The first six high-order bits of the DiffServ field are used to identify the Resource Reservation Protocol (RSVP) value.
F . The primary goal of DiffServ is scalability.
-
Which two statements are true about the implementation of QoS?()
A . Implementing DiffServ involves the configuration of RSVP.
B . Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices.
C . Implementing IntServ involves the utilization of RSVP.
D . Traffic should be classified and marked by the core network devices.
E . Traffic should be classified and marked as close to the edge of the network as possible.
-
Which two statements are true about the Application Grid ?()
A . Application Grid computing brings key industry-leading technologies like MS IIS and Grade WebLogic Server together.
B . Application Grid computing promotes well architectured sharing of resources.
C . Application Grid computing based on Oracle’s RAC technology.
D . Application Grid computing results in more predictable behavior through better instrumentation and more optimal allocation of resources.
-
Which two statements about the diffserv model are true?()
A . a class can be inentified as a single application .multiple applications with similar service nees.or be based on the source or destination ip addresses.
B . a drawback of the diffserv model is that it does not provide backward compatibility with devices that can only use the tos field.
C . diffserv uses the diffserv field in the MAC header to mark frames into behavior aggregates(BAs)
D . the diffserv field occupies the same eight bits of the mac header that were previously used for the tos field.
E . the first six high-order bits of the diffserv field are used to identify the resource reservation protocol(RSVP) value .
F . the primary goal of diffserv is scalabilty.
-
Which two statements about the SQL Management Base (SMB) are true? ()(Choose two.)
A . It contains only SQL profiles generated by SQL Tuning Advisor.
B . It stores plans generated by the optimizer using a stored outline.
C . It is part of the data dictionary and stored in the SYSAUX tablespace.
D . It is part of the data dictionary and stored in the SYSTEM tablespace.
E . It contains the statement log, the plan history, plan baselines, and SQL profiles.
-
Which two statements are true about the function of CAC?()
A . CAC provides guaranteed voice quality on a link.
B . CAC artificially limits the number of concurrent voice calls.
C . CAC is used to control the amount of bandwidth that is taken by a call on a link.
D . CAC prevents oversubscription of WAN resources that is caused by too much voice traffic.
E . CAC allows an unlimited number of voice calls while severely restricting,if necessary,other forms of traffic.
F . CAC solves voice congestion problems by using QoS to give priority to UDP traffic.
-
Which two statements are true about the WebLogic Cluster ?()
A . Clustered Servers capacity can be increased by adding new server instance to the cluster on an existing machine
B . Clustered Servers can be on a same or different machine with same operating system only
C . Clustered Servers can only be on a same machine or different operating system
D . Clustered Servers can be on a same or different machine with same or different operating system
-
Which two statements about the Wireless Location Appliance are true?()
A . a Wireless Location Appliance acts as a server to one or more Cisco WCSs. It collects, stores, and passes on data from its associated Cisco WLAN controllers
B . before using the Web interface, the initial configuration of the Wireless Location Appliance must be done using the command-line interface (CLI)
C . the Cisco 2000, 2700, 4100, and 4400 are examples of Wireless Location Appliance.
D . the Wireless Location Appliance visually displays the location information of WLAN devices and forwards this information to third-party applications using the Simple Network devices and forwards this information to third-party applications using the Simple Network Management Protocol (SNMP)
E . the Wireless Location Appliance visually tracks up to 15,000 WLAN devices and can store this information for 90 days.