-
Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()
A . It can be invoked only from the doGet or doPost methods.
B . It can be used independently of the getRemoteUser method.
C . Can return "true" even when its argument is NOT defined as a valid role name in the deployment descriptor.
D . Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.
-
Which two statements are true about the digital audio in a VoIP network? ()
A . Standard encoding techniques create an uncompressed digital data rate of 4000 bps.
B . Standard encoding techniques create an uncompressed digital data rate of 8000 bps.
C . Standard encoding techniques create an uncompressed digital data rate of 64,000 bps.
D . Voice quality is not a concern if compression is not used.
E . Two methods of quantization are linear and logarithmic.
F . Two methods of compression are u-law and a-law.
-
Which two statements are true about voice ports on a router?()
A . Calls to the PSTN can be made via the use of FXO or T1/E1 trunk ports.
B . Calls to the PSTN can be made via FXS or T1/E1 trunk ports.
C . Analog and IP phones can be connected to the VoIP network via FXO or T1/E1 trunk ports.
D . Calls between analog phones that are attached to the FXS ports in a VoIP network can be completely processed by voice-enabled routers.
-
Which two statements about QoS options in a Cisco UCS environment are true?()
A . The QoS policy assigns a system class to the outgoing traffic for a vNIC or vHBA.
B . Flow-control policies determine whether the uplink Ethernet ports in a Cisco UCS environment send and receive IEEE 802.3x pause frames when the send buffer for a port fills.
C . If no system class is configured as CoS 0, the Fibre Channel system class is used.
D . The user can configure QoS for these system classes: platinum, gold, silver, best effort, Fibre Channel.
E . When configuring a system class, the type of adapter in a server may limit the maximum MTU supported.
-
Which two statements are true about setting the FAST_START_MTTR_TARGET initializationparameter to a nonzero value()
A . The MTTR advisor will be disabled.
B . Automatic checkpoint tuning will be enabled.
C . The value for the LOG_CHECKPOINT_INTERVAL initialization parameter will be override the value forFAST_START_MTTR_TARGET.
D . The time taken to recover the instance after the crash is always exactly the same as the value given forthe FAST_START_MTTR_TARGET initialization parameter.
-
Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()
A . Packets can arrive out of order.
B . Packets must take the same path to the destination.
C . Once packets are received at the destination router, the router performs sampling to ensure the quality of the voice traffic.
D . Packets can experience varying delays across the network.
E . Packets containing voice samples are sequentially numbered by default, allowing for reordering upon arrival at the terminal router along the path.
-
Which two statements are true about a bitmap index? ()
A . It is recommended for the columns that have unique values.
B . It can be converted to a B-tree index by using the ALTER INDEX command.
C . It has a bitmap segment for each distinct value in the key column, containing a string of bits in which each bit represents the presence or absence of a key column value.
D . Updating the key column locks the whole bitmap segment that contains the bit for the key value to be updated.
-
Which two statements are true about a job chain?()
A . A job chain can contain a nested chain of jobs.
B . The jobs in a job chain cannot have more than one dependency.
C . A job of the CHAIN type can be run using event-based or time-based schedules.
D . The jobs in a job chain can be executed only by using the events generated by the Scheduler
-
Which two statements are true about a job chain?()
A . A job chain can contain a nested chain of jobs
B . The jobs in a job chain cannot have more than one dependency
C . A job of the CHAIN type can be run using event-based or time-based schedules
D . The jobs in a job chain can be executed only by using the events generated by the Scheduler
-
Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
A . CHAP uses a two-way handshake
B . CHAP authentication periodically occurs after link establishment
C . CHAP has no protection from playback attacks
D . CHAP authentication is performed only upon link establishment
E . CHAP uses a three-way handshake
F . CHAP authentication passwords are sent in plaintext
-
A Company is using 6to4 tunnels in their IPv6 network. Which two statements are true about thesetunnels?()
A . In a 6to4 tunnel, the first two bytes of the IPv6 address will be 0x2002 and the next four byteswill be the hexadecimal equivalent of the IPv4 address
B . In a 6to4 tunnel, the IPv4 address 192.168.99.1 would be converted to the2002:1315:4463:1::/64 IPv6 address
C . In a 6to4 tunnel, the IPv4 address 192.168.99.1 would be converted to the 2002:c0a8:6301::/48IPv6 address
D . In a 6to4 tunnel, the first two bytes of the IPv6 address will be locally derived and the next twobytes will be the hexadecimal equivalent of the IPv4 address
E . In a 6to4 tunnel, the IPv4 address 192.168.99.1 would be converted to the 2002:c0a8:6301::/16IPv6 addre
-
Which two statements are true about the primary key constraint in a table? ()
A . It is not possible to disable the primary key constraint.
B . It is possible to have more than one primary key constraint in a single table.
C . The primary key constraint can be referred by only one foreign key constraint.
D . The primary key constraint can be imposed by combining more than one column.
E . The non-deferrable primary key constraint creates an unique index on the primary key column if it is not already indexed.
-
Which two statements are true about the rendezvo us point (RP) in a multicast network?()
A . The multicast sources must register with the RP to form the multicast distribution tree.
B . An RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).
C . The mu lticast receivers must register with the RP to form the multicast distribution tree.
D . An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).
E . An RP is required only in networks running Protocol Independent Mu lticast sparse - dense mode (PIM - SDM).
F . To form the multicast distribution tree, the multicast sources register with and the receivers join the RP.
-
Which two statements about a wireless repeater topology are true?()
A . A wireless repeater is an access point that is not connected to the wired LAN.
B . The repeater feature is only available in lightweight access point topologies.
C . The SSID of the root access point must be configured on the repeater access point.
D . This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.
E . This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.
F . To avoid interference, the repeater access point must use a different channel from what the root access point uses.
-
Which two statements are true about the application of QoS in a converged network?()
A . end-to-end network delay times that exceed 50 ms for real-time traffic are considered unacceptable
B . end-to-end network delay times that exceed 250 ms for real-time traffic are considered unacceptable
C . end-to-end network delay is not a factor as long as the delay is consistent
D . some packet loss can be corrected by codec algorithms
E . RSVP handles voice packet retransmission
F . fragmentation is a result of packet lo
-
An SVI has been configured on a device. Which two statements are true about a switched virtualinterface (SVI)?()
A . An SVI is normally created for the default VLAN (VLAN1) to permit remote switchadministration
B . Multiple SVIs can be associated with a VLAN
C . SVI is another name for a routed port
D . An SVI is created by entering the no switchport command in interface configuration mode
E . An SVI provides a default gateway for a VLAN
-
Which two statements are true about the digital audio in a VoIP network?()
A . Standard encoding techniques create an uncompressed digital data rate of 4000 bps.
B . Standard encoding techniques create an uncompressed digital data rate of 8000 bps.
C . Standard encoding techniques create an uncompressed digital data rate of 64,000 bps.
D . Voice quality is not a concern if compression is not used.
E . Two methods of quantization are linear and logarithmic.
F . Two methods of compression are u-law and a-law.
-
Which two statements are true about using IPv4 and IPv6 simultaneously on a network segment? ()
A . IPv6 allows a host to create its own IPv6 address that will allow it to communicate to other devices on a network configured via DHCP. IPv4 does not provide a similar capability for hosts.
B . IPv6 provides for more host IP addresses but IPv4 provides for more network addresses.
C . Hosts can be configured to receive both IPv4 and IPv6 addresses via DHCP.
D . Host configuration options for IPv4 can be either statically assigned or assigned via DHCP.Host configuration options for IPv6 can be statically assigned only.
E . IPv4 and IPv6 addresses c an be simultaneously assigned to a host but not to a router interface.
-
Which two statements about configuration an unconnected Catalyst Express 500 switch from setup mode using a PC are true?()
A . You may use Cisco Network Assistant to set up the initial configuration
B . You must use CLI for initial configuration
C . You may use either CLI or CAN for configuration
D . You may make a direct connection to the PC from any point on the switch
E . You may only make a direct connection from the port with the flashing green LED to the PC
-
Which two statements are true about voice ports on a router? ()
A . Calls to the PSTN can be made via the use of FXO or T1/E1 trunk ports.
B . Calls to the PSTN can be made via FXS or T1/E1 trunk ports.
C . Analog and IP phones can be connected to the VoIP network via FXO or T1/E1 trunk ports.
D . Calls between analog phones that are attached to the FXS ports in a VoIP network can be completely processed by voice-enabled routers.
-
An SVI has been configured on a device. Which two statements are true about a switched virtual interface (SVI)?()
A . An SVI is normally created for the default VLAN (VLAN1) to permit remote switch administration.
B . Multiple SVIs can be associated with a VLAN.
C . SVI is another name for a routed port.
D . An SVI is created by entering the no switchport command in interface configuration mode.
E . An SVI provides a default gateway for a VLAN.
-
Which two statements about the use of VLANs to segment a network are true?()
A . VLANs increase the size of collision domains.
B . VLANs allow logical grouping of users by function.
C . VLANs simplify switch administration.
D . VLANs enhance network security.
-
Which two statements are true about a Work Item with "Open" Notification? ()(Choose two.)
A . The Work Item is not eligible for Purge.
B . The Work Item is eligible for a Permanent purge.
C . The Work Item is eligible for a Temporary purge.
D . The Work Item is not complete because it still has "Open" Notification.
E . The Work Item is eligible for both Temporary and Permanent purge.
-
Which two statements are true about a job chain? ()(Choose two.)
A . A job chain can contain a nested chain of jobs.
B . The jobs in a job chain cannot have more than one dependency.
C . A job of the CHAIN type can be run using event-based or time-based schedules.
D . The jobs in a job chain can be executed only by using the events generated by the Scheduler