-
What three tasks are required to add a CRS application?()
A . create a trigger
B . create an application
C . restart the CRS engine
D . upload script to repository
E . configure default session timeout&e
-
The three major causes for errors are: mother tongue interference,(),and inappropriate teaching materials or methods.
-
Which three configuration tasks are required to successfully deploy NBAR to recognize TCP and UDP stateful protocols? ()
A . over leased lines, use the multilink ppp command to reduce latency and jitter, and to create Distributed Link Fragmentation and interleaving
B . use the service-policy command to attach a traffic flow to an interface on the router
C . use the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses, and to guarantee admission of any flows
D . use the policy-map command to define one or more QoS policies (such as shaping, policing, and so on) to apply to traffic defined by a class map
E . use the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP value
F . use the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified
-
Which three of these are major components of an MPLS VPN network? ()
A . LDP notification
B . L2TPv3 session
C . VPN route target communities
D . Multiprotocol BGP peering of PE routers
E . MPLS forwarding
-
What are three benefits of GLBP?()
A . GLBP supports up to eight virtual forwarders per GLBP group
B . GLBP supports clear text and MD5 password authentication between GLBP group members
C . GLBP is an open source standardized protocol that can be used with multiple vendors
D . GLBP supports up to 1024 virtual routers
E . GLBP can load share traffic across a maximum of four routers
F . GLBP elects two AVGs and two standby AVGs for redundancy
-
Which three of these are major scaling, sizing, and performance considerations for an IPsec design?()
A . connection speed
B . number of remote sites
C . features to be supported
D . types of devices at the remote site
E . whether packets are encrypted using 3DES or AES
F . number of routes in the routing table at the remote site
-
What are three advantages of VLANs?()
A . VLANs establish broadcast domains in switched networks.
B . VLANs utilize packet filtering to enhance network security.
C . VLANs provide a method of conserving IP addresses in large networks.
D . VLANs provide a low-latency internet working alternative to routed networks.
E . VLANs allow access to network services based on department, not physical location.
F . VLANs can greatly simplify adding, moving, or changing hosts on the network.
-
Which three of these are major scaling, sizing, and performance considerations for an IP secdesign? ()
A . connection speed
B . number of remote sites
C . features to be supported
D . types of devices at the remote site
E . whether packets are encrypted using 3DES or AES
F . number of routes in the routing table at the remote site
-
What are you majoring in?()
A . In a university.
B . Very hard.
C . Mathematics.
D . At nine in the morning
-
Which three configuration tasks are required to successfully deploy NBAR to recognize TCP and UDP stateful protocols?()
A . Over leased lines,use the multilink ppp command to reduce latency and jitter,and to create Distributed Link Fragmentation and interleaving.
B . Use the service-policy command to attach a traffic flow to an interface on the router.
C . Use the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses,and toguarantee admission of any flows.
D . Use the policy-map command to define one or more QoS policies (such as shaping,policing,and so on) to apply to traffic defined by a class map.
E . Use the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP value.
F . Use the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified.
-
What are two major differences between MS-SPRing and SNCP?()
A . In an MS-SPRing, all paths are protected.
B . MS-SPRing is always a high-order protection.
C . A low order circuit cannot be protected by an MS-SPRing.
D . There is no theoretical limit in the number of nodes in an SNCP ring.
-
What three tasks must a network administrator perform to properly configure Hot Standby Routing Protocol (HSRP)?()
A . Define the encapsulation type.
B . Define the standby router.
C . Define the standby IP address.
D . Enable the standby priority.
-
What are three advantages of VLANs?()
A . VLANs establish broadcast domains in switched networks.
B . VLANs utilize packet filtering to enhance network security.
C . VLANs provide a method of conserving IP addresses in large networks.
D . VLANs provide a low-latency internetworking alternative to routed networks.
E . VLANs allow access to network services based on department,not physical location.
F . VLANs can greatly simplify adding,moving,or changing hosts on the network.
-
What are the major environment issues of America?
-
What are the major features of a familiar style of writing?
-
What are the three major variations of the External Narrator?
-
When we organize comparison and contrast paragraphs, what are two major ways used for reference?
A、Classic pattern
B、Block pattern
C、Drilling pattern
D、Alternative pattern
-
What are the three workers doing?
-
What are the major policy areas that the speaker covers in his speech?
-
In recent years, Microsoft has focused on three big tasks: building robust security into its software, resolving numerous antitrust complaints against it and upgrading its Windows operating system. These three tasks are now starting to collide.
On August 27th the firm said that the successor to its Windows XP operating system, code-named Longhorn, will go on sale in 2007 without one of its most impressive features, a technique to integrate elaborate search capabilities into nearly all desktop applications. (On the bright side, Longhorn will contain advances in rendering images and enabling different computing platforms to exchange data directly between applications.) It is a big setback for Microsoft, which considers search technology a pillar of its future growth—not least as it competes against Google.
The firm's focus on security championed by Bill Gates himself—took resources away from Longhorn, admits Greg Sullivan, a lead product manager in the Windows client division. Programmers have been fixing Windows XP rather than working on Longhorn. In mid-August, Microsoft released Service Pack 2, a huge set of free software patches and enhancements to make Windows XP more secure. Though some of the fixes turned out to have vulnerabilities of their own, the patches have mostly been welcomed. Microsoft's decision to forgo new features in return for better security is one that most computer users will probably applaud.
Yet ironically, as Microsoft slowly improves the security of its products-by, for instance, incorporating firewall technology, anti-virus systems and spam filters its actions increasingly start to resemble those that, in the past, have got the firm into trouble with regulators. Is security software an "adjacent software market", in which case Microsoft may be leveraging its dominance of the operating system into it? Integrating security products into Windows might be considered "bundling" which, with regard to web browsing, so excited America's trustbusters in the 1990s. And building security directly into the operating system seems a lot like "commingling" software code, on which basis the European Commission ruled earlier this year that Microsoft abused its market power through the Windows Media Player. Microsoft is appealing against that decision, and on September 30th it will argue for a suspension of the commission's remedies, such as the requirement that it license its code to rivals.
Just last month, the European Union's competition directorate began an investigation into Microsoft and Time Warner, a large media firm, on the grounds that their proposed joint acquisition of Content Guard, a software firm whose products protect digital media files, might provide Microsoft with, undue market power over digital media standards. The commission will rule by January 2005. Microsoft, it seems, in security as elsewhere, is going to have to get used to being punished for its success. Its Windows monopoly lets it enjoy excessive profits but the resulting monoculture makes it an obvious target for viruses and regulators alike.
That Microsoft's three tasks are colliding is reflected in the fact that ______.
A.the new operating system will be marketed at a discount
B.search will be removed from the new operating system
C.all search capabilities will be combined into the desktop
D.images and data will be exchanged more directly
-
What are the tasks
-
That Microsofts three tasks are colliding is reflected in the fact that______.
A.the new operating system will be marketed at a discount
B.search will be removed from the new operating system
C.all search capabilities will be combined into the desktop
D.images and data will be exchanged more directly
-
What are the four major financial performance indicators?
A.Liquidity
B.Profitability
C.Gearing
D.Survival and Growth
-
What are the major kinds of the more than 3,000 excavations found in Mawangdui()
A.Catering, cosmetic, recreation, sacrificial and warring equipment
B.Catering, sacrificial, cosmetic, recreation and production equipment
C.Servant, sacrificial, cosmetic, travel and production equipment
D.Catering, sacrificial, cosmetic and recreation equipment