-
Which four statements about NetFlow are true?()
A . NetFlow records bidirectional IP traffic flow.
B . NetFlow export can be implemented over IPv4.
C . NetFlow export can be implemented over IPv6.
D . NetFlow records multicast IP traffic flow.
E . NetFlow records ingress traffic.
F . NetFlow records egress traffic.
-
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()
A . EVC infrastructure is a Layer 3 platform-independent routing architecture that supports IP overEthernet services
B . Ethernet flow point (EFP) is configured on the main interface
C . Feature commands like MQC-based QoS policies can be specified
D . EVC infrastructure is a Layer 2 platform-independent bridging architecture that supports Ethernetservices
E . Each Ethernet flow point (EFP) matches a predefined VLAN tag-based criteria
F . Ethernet flow point (EFP) is configured on the VLAN interface
-
You are enabling AAA RADIUS/TACACS+ on a UCS which attribute must be added to the User account?()
A . Encryption algorithm
B . Shared Secret Key
C . Security policy
D . CiscoAvPair
-
Which four of these are MPLS label header fields? ()
A . Label
B . VPI VCI
C . EXP
D . TTL
E . FCS
F . S flag
-
Which four statements are true?()
A . Has-a relationships should never be encapsulated.
B . Has-a relationships should be implemented using inheritance.
C . Has-a relationships can be implemented using instance variables.
D . Is-a relationships can be implemented using the extends keyword.
E . Is-a relationships can be implemented using the implements keyword.
F . An array or a collection can be used to implement a one-to-many has-a relationship.
-
Which four are true?()
A . Has-a relationships should never be encapsulated.
B . Has-a relationships should be implemented using inheritance.
C . Has-a relationships can be implemented using instance variables.
D . Is-a relationships can be implemented using the extends keyword.
E . Is-a relationships can be implemented using the implements keyword.
F . An array or a collection can be used to implement a one-to-many has-a relationship.
G . The relationship between Movie and Actress is an example of an is-a relationship.
-
Which four are valid Oracle constraint types? ()
A . CASCADE
B . UNIQUE
C . NONUNIQUE
D . CHECK
E . PRIMARY KEY
F . CONSTANT
G . NOT NULL
-
Which four are types of functions available in SQL? ()
A . string
B . character
C . integer
D . calendar
E . numeric
F . translation
G . date
H . conversio
-
Which three BGP attributes are carried by TLV?()
A . local preference
B . weight
C . origin
D . Network Layer Reachability Information
E . multiple exit discriminator
-
Which two are attributes of iSQL*Plus? ()
A . iSQL*Plus commands cannot be abbreviated.
B . iSQL*Plus commands are accessed from a browser.
C . iSQL*Plus commands are used to manipulate data in tables.
D . iSQL*Plus commands manipulate table definitions in the database.
E . iSQL*Plus is the Oracle proprietary interface for executing SQL statements.
-
Which four are correct guidelines for naming database tables? ()
A . Must begin with either a number or a letter.
B . Must be 1-30 characters long.
C . Should not be an Oracle Server reserved word.
D . Must contain only A-Z, a-z, 0-+, _, *, and #.
E . Must contain only A-Z, a-z, 0-9, _, $, and #.
F . Must begin with a letter.
-
Which four actions are possible during an Online Data file Move operation?()
A . Creating and dropping tables in the data file being moved
B . Performing file shrink of the data file being moved
C . Querying tables in the data file being moved
D . Performing Block Media Recovery for a data block in the data file being moved
E . Flashing back the database
F . Executing DML statements on objects stored in the data file being moved
-
Which four statements about an IP service level agreement (SLA) are true? ()
A . SLA responder knows type of operation, the port used, and duration.
B . SLA responder inserts in and out timestamps in the packet payload.
C . SLA sender and responder use the IP SLA Control Protocol to communicate with each other before
D . SLA sender and responder communication can be encrypted.
E . SLA sender and responder communication can be authenticated with MD5.
-
Which three statements about the BGP next-hop attribute are true? ()
A . EBGP sessions between confederation sub ASs do not modify the next-hop attribute.
B . By default, iBGP sessions change the next-hop attribute learned from eBGP peers to self address.
C . By default, the next-hop attribute is not changed when a prefix is reflected by the route reflector
D . EBGP sessions between confederation sub ASs change the next-hop attribute to peer address.
E . By default, iBGP sessions preserve the next-hop attribute learned from eBGP peers.
-
Which four service offerings are included in Oracle Public Cloud?()
A . Database Service
B . Data Service
C . Java Service
D . Security Service
E . .NET Service
F . SOA Service
-
Which four statements about the Carrier Supporting Carrier (CSC) feature are true? ()
A . MPLS is required between the PE and CE routers that connect the backbone carrier to the customer carrier.
B . The backbone carrier must enable the PE router to check that the packets it receives from the CErouter contain only the labels that the PE router advertised to the CE router.
C . Every packet that crosses the backbone carrier must be encapsulated so that the packet includes MPLS labels
D . AII PE routers that link the backbone carrier to the customer carrier must run Route Target Rewrite.
E . Arouting protocol is required between the PE and CE routers that connect the backbone carrierto thecustomer carrier. The routing protocol enables the customer carrier to exchange IGP routing information with the backbone carrier.
-
All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()
A . privilege-level configuration
B . fabric cards
C . SNMP traps
D . admin- level configuration
E . exec- level configuratio
-
Which four statements correctly describe functions that are available in SQL? ()
A . INSTR returns the numeric position of a named character.
B . NVL2 returns the first non-null expression in the expression list.
C . TRUNCATE rounds the column, expression, or value to n decimal places.
D . DECODE translates an expression after comparing it to each search value.
E . TRIM trims the heading or trailing characters (or both) from a character string.
F . NVL compares two expressions and returns null if they are equal, or the first expression if they are not equal.
G . NULLIF compares two expressions and returns null if they are equal, or the first expression if they are not equal.
-
Which four are components of the Cisco collaboration Architecture strategy?()
A . video
B . intercompany communications
C . covergence protocols
D . dedicated networking
E . clod computing
F . enterprise social networking
G . interoperability
-
Which two are attributes of /SQL*Plus? ()
A . /SQL*Plus commands cannot be abbreviated.
B . /SQL*Plus commands are accesses from a browser.
C . /SQL*Plus commands are used to manipulate data in tables.
D . /SQL*Plus commands manipulate table definitions in the database.
E . /SQL*Plus is the Oracle proprietary interface for executing SQL statements.
-
The Origin attribute describes the source of the BGP prefix.Which three are valid Origin codes?() (Choose three.)
A.IGP
B.BGP
C.EGP
D.Incomplete
E.Anonymous