-
Which two of these are correct regarding access control lists? (Choose two.) ()
A . An ACL can be applied to multiple interlaces.
B . An ACL wildcard mask is identical to an IP subnet mask.
C . There may be multiple ACLs per protocol, per direction, and per interface.
D . There is an "implicit deny" at the end of an ACL and will result in a dropped packet.
E . An ACL acts on all packets, those flowing thru the router and those originated by the router itself.
F . An ACL will be processed from top to bottom and may have multiple matches that will act on the packet that is being tested.
-
Which two statements about zoning are correct? ()
A . Zoning increases security.
B . DNS queries are used for software zoning.
C . Software zoning is more secure than hardware zoning.
D . When using zones and VSANs together, the zone is created first.
E . Zoning requires that VSANs be established before it becomes operational.
-
Which two statements are correct about database transportation?() (Choose two.)
A . The source and target platforms must be the same
B . Redo logs, control files and temp files are also transported
C . The transported database must have the same database identifier (DBID) as the source database and cannot be changed
D . The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transported
E . Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format
-
Which two statements are correct about database transportation? ()
A . The source and target platforms must be the same
B . Redo logs, control files and temp files are also transported
C . The transported database must have the same database identifier (DBID) as the source database and cannot be changed
D . The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transported
E . Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format
-
Which two statements are correct regarding Flex Links? ()
A . An interface can belong to multiple Flex Links.
B . Flex Links operate only over single pairs of links.
C . Flex Link pairs must be of the same interface type
D . Flex Links automatically disable STP so no BPDUs are propagated
E . Failover from active to standby on Flex Links takes less than a second
-
Which two statements regarding the Flashback Table feature are correct?()
A . Flashback Table can be performed on system tables.
B . Flashback Table operation does not shrink the segments.
C . Flashback Table uses log mining to extract SQL_REDO and SQL_UNDO statements.
D . Flashback Table operation acquires exclusive data manipulation language (DML) locks.
-
Which two statements about zoning are correct?()
A . Zoning increases security.
B . DNS queries are used for software zoning.
C . Software zoning is more secure than hardware zoning.
D . When using zones and VSANs together, the zone is created first.
E . Zoning requires that VSANs be established before it becomes operational.
-
Which two of these statements regarding RSTP are correct?()
A . RSTP cannot operate with PVST+.
B . RSTP defines new port roles.
C . RSTP defines no new port states.
D . RSTP is a proprietary implementation of IEEE 802.1D STP.
E . RSTP is compatible with the original IEEE 802.1D STP.
-
Which two steps are the result of associating a blade server?()
A . The compute node reboots and is then connected to the CMC
B . A compute node is assigned to a service profile
C . if the association is successful the cisco UCS manager boots the cisco UUOS to configure the compute node
D . The compute node reboots to reload and then loads NX OS and establishes connections to both the CMC and the IOM
-
Which two statements are correct about Nonstop Forwarding?()
A . It allows the standby RP to take control of the device after a hardware or software fault on the active RP.
B . It is a Layer 3 function that works with SSO to minimize the amount of time a network is unavailable tousers following a switchover.
C . It is supported by the implementation of EIGRP, OSPF, RIPv2, and BGP protocols.
D . It synchronizes startup configuration, startup variables, and running configuration.
E . The main objective of NSF is to continue forwarding IP packets following a switchover.
F . Layer 2 802.1w or 802.1s must be used, as 802.1d cannot process the Layer 2 changes.
G . Routing protocol tuning parameters must be the same as the NSF parameters, or failover will beinconsistent.
-
Which two statements about the EIGRP DUAL process are correct?()
A . An EIGRP route will go active if there are no successors or feasible successors in the EIGRP topology table.
B . An EIGRP route will go passive if there are no successors in the EIGRP topology table.
C . DUAL will trigger an EIGRP query process while placing the flapping routes in the holddown state.
D . A feasible successor in the EIGRP topology table can become the successor only after all the query requests have been replied to.
E . The stuck in active state is caused when the wait for the query replies have timed out.
F . EIGRP queries are sent during the loading state in the EIGRP neighbor establishment process.
-
Which two statements about Network Attached Storage are correct?()
A . Data is accessed using NFS or CIFS.
B . Data is accessed at the block level.
C . NAS is referred to as captive storage.
D . Storage devices can be shared between users.
E . A NAS implementation is not as fast as a DAS implementation.
-
Which two statements are correct regarding the Flashback Versions Query feature?()
A . You can use this feature to identify the committed versions of the rows, but not the uncommitted versions.
B . You can use this feature to identify the versions of V$ views.
C . You can use this feature to identify the inserts, deletes, and updates performed on a particular row but not the data definition language (DDL) operations performed on the table.
D . You can use this feature for a table only if row movement is enabled for the table.
E . You can use this feature to identify the versions of external and fixed tables.
-
Which two statements about FCIP and iSCSI are correct?()
A . The FCIP stack supports file-level storage for remote devices.
B . Both require high throughput with low latency and low jitter.
C . The purpose of FCIP is to provide connectivity between host and storage.
D . The iSCSI stack supports block-level storage for remote devices.
E . The purpose of iSCSI is to provide connectivity between separate wide-area SANs.
-
Which two statements about Network Attached Storage are correct?()
A . Data is accessed using NFS or CIFS.
B . Data is accessed at the block level.
C . NAS is referred to as captive storage.
D . Storage devices can be shared between users.
E . A NAS implementation is not as fast as a DAS implementation.
-
Which two statements about the configuration of the switch interface are correct (Choose two)()。
A . The switchport belongs only to VLAN 2
B . Interface fa0/0 will be in both VLAN 1 (by default) and VLAN 2
C . The exhibit shows interface fa0/0 to be dynamically mapped to VLAN 2
D . A network host can be connected to this interface
-
Which two statements regarding the Flashback Table feature are correct?()
A . Flashback Table can be performed on system tables.
B . Flashback Table operation does not shrink the segments.
C . Flashback Table uses log mining to extract SQL_REDO and SQL_UNDO statements.
D . Flashback Table operation acquires exclusive data manipulation language (DML) locks.
-
Which two of these statements regarding RSTP are correct?()
A . RSTP cannot operate with PVST+.
B . RSTP defines new port roles.
C . RSTP defines no new port states.
D . RSTP is a proprietary implementation of IEEE 802.1D STP.
E . RSTP is compatible with the original IEEE 802.1D STP.
-
Which two steps are executed in the deployment of Cisco AutoQoS for Enterprise?()
A . The customer uses SNMP statistics to create the policy.
B . QoS policy templates are generated and installed on the interface.
C . RTP is used to generate the policy.
D . LLQ,cRTP,and LFI are used to automatically discover the policy.
E . The auto-generated policy is manually optimized before implementation.
F . Auto-discovery is used to determine what traffic is on the interface.
-
Which two statements about Cisco Security Management Suite are correct?()
A . It should be implemented in a management VLAN.
B . Its connection to managed devices should be over a data VLAN.
C . It is made up of Cisco Security MARS and Clean Access software.
D . It should be deployed as close to the edge of the network as possible.
E . It delivers policy administration and enforcement for the Cisco Self-Defending Network.
-
Which two statements about Cisco Security Management Suite are correct? ()
A . It should be implemented in a management VLAN.
B . Its connection to managed devices should be over a data VLAN.
C . It is made up of Cisco Security MARS and Clean Access software.
D . It should be deployed as close to the edge of the network as possible.
E . It delivers policy administration and enforcement for the Cisco Self-Defending Network.
-
Which two statements about FCIP and iSCSI are correct?()
A . The FCIP stack supports file-level storage for remote devices.
B . Both require high throughput with low latency and low jitter.
C . The purpose of FCIP is to provide connectivity between host and storage.
D . TheiSCSI stack supports block-level storage for remote devices.
E . The purpose ofiSCSI is to provide connectivity between separate wide-area SANs.
-
Which two statements are correct about database transportation?()
A . The source and target platforms must be the same
B . Redo logs,control files and temp files are also transported
C . The transported database must have the same database identifier (DBID) as the source database and cannot be changed
D . The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transported
E . Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format
-
Which two statements are correct? Choose two answers.