-
What are three Cisco Unified CallManager features? ()
A . programming interface to external applications
B . FXS and FXO port negotiation
C . AutoQos VoIP trust boundaries
D . signaling and device control
E . LLQ for voice and video traffic
F . directory and XML service
-
What are three benefits of implementing vlans?()
A . A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure
B . Broadcast storms can be mitigated by decreasing the number of broadcast domains,thus increasing their size.
C . A higher level of network security can be reached by separating sensitive data traffic from other network traffic.
D . Port-based vlans increase switch-port use efficient,thanks to 802.1Q trunks
E . A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure.
F . Broadcast storms can be mitigated by increasing the number of broadcast domains,thus reducing their size.
G . VLANs make it easier for IT staff to configure new logical groups,because the vlans all belong to the same broadcast domain.
-
What are three IPv6 transition mechanisms?()
A . 6to4 tunneling
B . VPN tunneling
C . GRE tunneling
D . ISATAP tunneling
E . PPP tunneling
F . Teredo tunneling
-
Which three configuration tasks are required to successfully deploy NBAR to recognize TCP and UDP stateful protocols? ()
A . over leased lines, use the multilink ppp command to reduce latency and jitter, and to create Distributed Link Fragmentation and interleaving
B . use the service-policy command to attach a traffic flow to an interface on the router
C . use the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses, and to guarantee admission of any flows
D . use the policy-map command to define one or more QoS policies (such as shaping, policing, and so on) to apply to traffic defined by a class map
E . use the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP value
F . use the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified
-
What are three benefits of GLBP?()
A . GLBP supports up to eight virtual forwarders per GLBP group
B . GLBP supports clear text and MD5 password authentication between GLBP group members
C . GLBP is an open source standardized protocol that can be used with multiple vendors
D . GLBP supports up to 1024 virtual routers
E . GLBP can load share traffic across a maximum of four routers
F . GLBP elects two AVGs and two standby AVGs for redundancy
-
What are three uses for record groups?()
A . To pass data to a pop-up menu.
B . To populate a base table block.
C . To pass data to other form modules.
D . To pass data to other Oracle products.
E . To dynamically construct SELECT statements.
F . To server as the source for a FROM clause query.&e
-
What are three advantages of VLANs?()
A . VLANs establish broadcast domains in switched networks.
B . VLANs utilize packet filtering to enhance network security.
C . VLANs provide a method of conserving IP addresses in large networks.
D . VLANs provide a low-latency internet working alternative to routed networks.
E . VLANs allow access to network services based on department, not physical location.
F . VLANs can greatly simplify adding, moving, or changing hosts on the network.
-
What are three facts control plane policing? ()
A . a set of rules that can be established and associated with the ingress and egress ports of the control plane
B . improves performance of the control plane by marking control plane packets with DSCPEF
C . protects the control plane on a router from DoS attacks
D . treats the control plane as a separate entity with its own ingress (input) and egress (output) ports
E . provides the control plane with a separate token bucket
F . enhances security of the control plane by tunneling packets to and from the control plane
-
What are three IPv6 transition mechanisms?()
A . 6to4 tunneling
B . VPN tunneling
C . GRE tunneling
D . ISATAP tunneling
E . PPP tunneling
F . Teredo tunneling
-
Which three configuration tasks are required to successfully deploy NBAR to recognize TCP and UDP stateful protocols?()
A . Over leased lines,use the multilink ppp command to reduce latency and jitter,and to create Distributed Link Fragmentation and interleaving.
B . Use the service-policy command to attach a traffic flow to an interface on the router.
C . Use the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses,and toguarantee admission of any flows.
D . Use the policy-map command to define one or more QoS policies (such as shaping,policing,and so on) to apply to traffic defined by a class map.
E . Use the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP value.
F . Use the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified.
-
What are three benefits of implementing vlans?()
A . A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure
B . Broadcast storms can be mitigated by decreasing the number of broadcast domains,thus increasing their size
C . A higher level of network security can be reached by separating sensitive data traffic from other network traffic
D . Port-based vlans increase switch-port use efficient,thanks to 802.1Q trunks
E . A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure
F . Broadcast storms can be mitigated by increasing the number of broadcast domains,thus reducing theirsize
G . VLANs make it easier for IT staff to configure new logical groups,because the vlans all belong to thesame broadcast domai
-
What three major tasks are performed by a Designated Intermediate System in an ISIS pseudonodeenvironment?()
A . Updating the pseudonode LSP
B . maintaining pseudonode link-state information
C . creating the pseudonode
D . flooding LSPs over the LAN
E . election of the pseudonode
-
What three tasks must a network administrator perform to properly configure Hot Standby Routing Protocol (HSRP)?()
A . Define the encapsulation type.
B . Define the standby router.
C . Define the standby IP address.
D . Enable the standby priority.
-
What are three benefits of using ASM?()
A . Ease of disk administration and maintenance
B . Load balancing across physical disks
C . Software RAID-1 data redundancy with double or triple mirrors
D . Automatic recovery of failed disk
-
What are three Cisco Unified CallManager features?()
A . programming interface to external applications
B . FXS and FXO port negotiation
C . AutoQos VoIP trust boundaries
D . signaling and device control
E . LLO for voice and video traffic
F . directory and XML service
-
What are three advantages of VLANs?()
A . VLANs establish broadcast domains in switched networks.
B . VLANs utilize packet filtering to enhance network security.
C . VLANs provide a method of conserving IP addresses in large networks.
D . VLANs provide a low-latency internetworking alternative to routed networks.
E . VLANs allow access to network services based on department,not physical location.
F . VLANs can greatly simplify adding,moving,or changing hosts on the network.
-
What are the three Mongolian manly sports ?
-
What are the three boys doing tonight?
-
What are the three Mongolian manly sports?
-
What are the three workers doing?
-
What are three great mountains in China?
-
In recent years, Microsoft has focused on three big tasks: building robust security into its software, resolving numerous antitrust complaints against it and upgrading its Windows operating system. These three tasks are now starting to collide.
On August 27th the firm said that the successor to its Windows XP operating system, code-named Longhorn, will go on sale in 2007 without one of its most impressive features, a technique to integrate elaborate search capabilities into nearly all desktop applications. (On the bright side, Longhorn will contain advances in rendering images and enabling different computing platforms to exchange data directly between applications.) It is a big setback for Microsoft, which considers search technology a pillar of its future growth—not least as it competes against Google.
The firm's focus on security championed by Bill Gates himself—took resources away from Longhorn, admits Greg Sullivan, a lead product manager in the Windows client division. Programmers have been fixing Windows XP rather than working on Longhorn. In mid-August, Microsoft released Service Pack 2, a huge set of free software patches and enhancements to make Windows XP more secure. Though some of the fixes turned out to have vulnerabilities of their own, the patches have mostly been welcomed. Microsoft's decision to forgo new features in return for better security is one that most computer users will probably applaud.
Yet ironically, as Microsoft slowly improves the security of its products-by, for instance, incorporating firewall technology, anti-virus systems and spam filters its actions increasingly start to resemble those that, in the past, have got the firm into trouble with regulators. Is security software an "adjacent software market", in which case Microsoft may be leveraging its dominance of the operating system into it? Integrating security products into Windows might be considered "bundling" which, with regard to web browsing, so excited America's trustbusters in the 1990s. And building security directly into the operating system seems a lot like "commingling" software code, on which basis the European Commission ruled earlier this year that Microsoft abused its market power through the Windows Media Player. Microsoft is appealing against that decision, and on September 30th it will argue for a suspension of the commission's remedies, such as the requirement that it license its code to rivals.
Just last month, the European Union's competition directorate began an investigation into Microsoft and Time Warner, a large media firm, on the grounds that their proposed joint acquisition of Content Guard, a software firm whose products protect digital media files, might provide Microsoft with, undue market power over digital media standards. The commission will rule by January 2005. Microsoft, it seems, in security as elsewhere, is going to have to get used to being punished for its success. Its Windows monopoly lets it enjoy excessive profits but the resulting monoculture makes it an obvious target for viruses and regulators alike.
That Microsoft's three tasks are colliding is reflected in the fact that ______.
A.the new operating system will be marketed at a discount
B.search will be removed from the new operating system
C.all search capabilities will be combined into the desktop
D.images and data will be exchanged more directly
-
What are the tasks
-
That Microsofts three tasks are colliding is reflected in the fact that______.
A.the new operating system will be marketed at a discount
B.search will be removed from the new operating system
C.all search capabilities will be combined into the desktop
D.images and data will be exchanged more directly