-
Which two statements best describe EtherChannel?()
A . EtherChannel technology helps aggregate traffic grouping multiple,full-duplex point-to-point linkstogether
B . EtherChannel technology is based on the 802.1 IEEE stand
C . EtherChannel can aggregate up to 800 Mbps,8 Gbps,or Gbps of aggregate bandwidth for a Fast EtherChannel,Gigabit EtherChannel,or 10 Gigabit EtherChannel connection respectively
D . EtherChannel is defined for Rapid Spanning Tree for faster convergence
-
Which two characteristics apply to Cisco Catalyst 6500 Series Switch supervisor redundancy using NSF?()
A . independent of SSO
B . NSF combined with SSO enables supervisor engine load balancing
C . supported by RIPv2, OSPF, IS-IS, and EIGRP
D . supports IPv4 and IPv6 multicast
E . prevents route flapping
F . dependent on FIB table
-
Which two statements apply to dynamic access lists?()
A . they offer simpler management in large internetworks.
B . you can control logging messages.
C . they allow packets to be filtered based on upper-layer session information.
D . you can set a time-based security policy.
E . they provide a level of security against spoofing.
F . they are used to authenticate individual user
-
Which statements are true regarding table compression? ()(Choose all that apply.)
A . It saves disk space and reduces memory usage.
B . It saves disk space but has no effect on memory usage.
C . It incurs extra CPU overhead during DML as well as direct loading operations.
D . It incurs extra CPU overhead during DML but not direct loading operations.
E . It requires uncompress operation during I/O.
-
Which of the following statements are true regarding Layer 3 switches?(Choose all that apply.)()
A . A routed port does not run STP or DTP
B . A routed port is considered to be in a down state if it is not operational at both Layer 1 andLayer 2
C . An SVI is considered to be in a down state if it is not operational at both Layer 1 and Layer 2
D . An SVI is considered to be in a down state only when none of the ports in the correspondingVLAN are active
E . An SVI port does not run 5TP or DTP
F . To create a trunk, an SVI can be logically divided into subinterface
-
Which of the following statements applies to the x445 memory subsystem?()
A . With XA-32 architecture, addressing more than 64GB of RAM can be installed.
B . The amount of memory should be balanced across ports for best performance.
C . All DIMM slots should be populated in numerical order - slot 1 before slot 2, slot 2 before slot 3, etc.
D . All even number DIMM slots should be populated before odd number DIMM slots.
-
Which two statements correctly describe VTP?()
A . Transparent mode always has a configuration revision number of 0.
B . Transparent mode cannot modify a VLAN database.
C . Client mode cannot forward received VTP advertisements.
D . Client mode synchronizes its VLAN database from VTP advertisements.
E . Server mode can synchronize across VTP domains.
-
Which two statements are true?()
A . It is possible for more than two threads to deadlock at once.
B . The JVM implementation guarantees that multiple threads cannot enter into a deadlocked state.
C . Deadlocked threads release once their sleep() method’s sleep duration has expired.
D . Deadlocking can occur only when the wait(), notify(), and notifyAll() methods are used incorrectly.
E . It is possible for a single-threaded application to deadlock if synchronized blocks are used incorrectly.
F . If a piece of code is capable of deadlocking, you cannot eliminate the possibility ofdeadlocking by insertinginvocations of Thread.yield().
-
Which two statements complete a transaction?()
A . DELETE employees;
B . DESCRIBE employees;
C . ROLLBACK TO SAVEPOINT C;
D . GRANT SELECT ON employees TO SCOTT;
E . ALTER TABLE employees SET UNUSED COLUMN sal;
F . Select MAX(sal) FROM employees WHERE department_id = 20
-
Which two statements describe traffic policing?()
A . Traffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of data
B . Excess traffic is buffered so that the traffic remains within the desired rate.
C . Packets that conform to traffic policies are not delayed.
D . Packet marking is available and allows excess packets to be re-marked with a lower priorit
-
Which two statements best describe CBWFQ?()
A . The CBWFQ scheduler provides a guaranteed minimum amount of bandwidth to each class.
B . CBWFQ services each class queue using a strict priority scheduler.
C . The class-default queue only supports WFQ.
D . Inside a class queue, processing is always FIFO, except for the class-default queue.
-
Which two multicast protocol statements are true? (Choose two.) ()
A . Dense mode multicast requires explicit join messages from their members.
B . Dense mode multicast uses a push model to flood traffic throughout the network and then prunes the unwanted traffic.
C . Sparse mode multicast uses a pull model to send multicast traffic to where it is requested.
D . Sparse mode uses reverse path forwarding (RPF) to prune off redundant flows.
E . The primary use of sparse mode multicast is for test labs and router performance testing.
-
Which of the following statements concerning IGMP are correct?(Choose all that apply.)()
A . With IGMPvl, queries are sent to a specific group
B . Hosts issuing IGMPvl requests will be correctly interpreted by IGMPv2 hosts due to backwardcompatibility
C . An IGMPv2 router will ignore IGMPv2 leave messages when IGMFVl hosts are present
D . With IGMFV2, a leave message is supported
E . An IGMPv2 host will send an IGMFVl report on an IGMFVl router
F . An IGMPv2 router can only allow IGMPv2 hosts to execute a join request
-
Which statements about the MEMORY_TARGET initialization parameter are true?() (Choose all that apply.)
A . MEMORY_TARGET can be increased up to the value of MEMORY_MAX_TARGET, if MEMORY_MAX_TARGET is set to a value greater than zero
B . MEMORY_MAX_TARGET defaults to a value of zero if MEMORY_TARGET is not set
C . MEMORY_TARGET represents the total amount of memory that can be allocated to SGA and PGA memory structures.
D . MEMORY_TARGET is static and cannot be modified without shutting down the instance
-
Which of the following statements is true about the 80/20 rule (Select all that apply)?()
A . 20 percent of the traffic on a network segment should be local.
B . no more than 20 percent of the network traffic should be able to move across a backbone.
C . no more than 80 percent of the network traffic should be able to move across a backbone.
D . 80 percent of the traffic on a network segment should be local.
-
Which of the following are true statements regarding the characteristics of OSPF areas? Select all that apply.()
A . All OSPF networks require the use of multiple areas
B . Multiple OSPF areas must connect to area 0
C . Single area OSPF networks must be configured in area 1
D . Areas can be assigned any number from 0 to 63535
E . Area 0 is called the backbone area
F . Each OSPF area need to be configured with a loopback interface
-
Which two characteristics apply to a CAS T1 interface?()
A . signaling travels in-band
B . up to 24 voice channels
C . up to 32 voice channels
D . signaling travels in time slot 17
E . uses Q.931 signaling protocol in a common channel
-
Which two statements are true?()
A . It is possible for more than two threads to deadlock at once.
B . The JVM implementation guarantees that multiple threads cannot enter into a deadlocked state.
C . Deadlocked threads release once their sleep() method's sleep duration has expired.
D . Deadlocking can occur only when the wait(), notify(), and notifyAll() methods are used incorrectly.
E . It is possible for a single-threaded application to deadlock if synchronized blocks are used incorrectly.
F . If a piece of code is capable of deadlocking, you cannot eliminate the possibility of deadlocking by inserting invocations of Thread.yield().
-
Which two characteristics apply to Cisco Catalyst 6500 Series Switch supervisor redundancyusing NSF?()
A . independent of SSO
B . NSF combined with SSO enables supervisor engine load balancing
C . supported by RIPv2, OSPF, IS-IS, and EIGRP
D . supports IPv4 and IPv6 multicast
E . prevents route flapping
F . dependent on FIB table
-
Which statement about access lists that are applied to an interface is true?()
A . you can apply multiple access lists with the same protocol or in different…
B . you can config one access list,per direction,per layer 3 protocol
C . you can placeasmanyaccess lists as you want on any interface
D . you can apply ony one access list on any interface
-
Which two statements are correct? Choose two answers.
-
which are DML statements(choose all that apply)()。
A.merge
B.update
C.delete
D.commit
-
Which of the following statement applies to the Enterprise Portal? Please choose the correct answer.()
A.The portal is an interface for managing variants of frequently-used transactions
B.The portal buffers all data so that work can continue in the portal if one of the assigned systems fails
C.The portal is a uniform. framework for accessing company data from different systems
D.The portal is only a source of information (display function) and is not used for processing data