-
Which four statements about NetFlow are true?()
A . NetFlow records bidirectional IP traffic flow.
B . NetFlow export can be implemented over IPv4.
C . NetFlow export can be implemented over IPv6.
D . NetFlow records multicast IP traffic flow.
E . NetFlow records ingress traffic.
F . NetFlow records egress traffic.
-
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()
A . EVC infrastructure is a Layer 3 platform-independent routing architecture that supports IP overEthernet services
B . Ethernet flow point (EFP) is configured on the main interface
C . Feature commands like MQC-based QoS policies can be specified
D . EVC infrastructure is a Layer 2 platform-independent bridging architecture that supports Ethernetservices
E . Each Ethernet flow point (EFP) matches a predefined VLAN tag-based criteria
F . Ethernet flow point (EFP) is configured on the VLAN interface
-
You are designing a strategy of enforce the corporate security policy. Which action or actions should you perform?()
A . Configure a password policy that requires strong passwords
B . Configure a password policy that requires all users to change their passwords once a month.
C . Allow users in the branch offices to log on between the hours of 8:00 AM and 5:00 PM, Monday through Friday.
D . Allow users in the retail outlets to log on between the hours of 6:00 AM and 11:00 PM, daily.
E . Enable a policy that forces users to log off when their logon hours expire.&e
-
Which four actions can you perform using the WebLogic Admin Console?()
A . Stop and start Managed Servers using the Node Manager.
B . Stop and start Coherence Servers using the Node Manager.
C . Create a WebLogic Domain Template.
D . Create and target JDBC connection pools.
E . Create and target WebLogic Diagnostic Framework Diagnostic Modules.
F . Change Java command-line parameters at run time.
-
Which four of these are MPLS label header fields? ()
A . Label
B . VPI VCI
C . EXP
D . TTL
E . FCS
F . S flag
-
Which four statements are true?()
A . Has-a relationships should never be encapsulated.
B . Has-a relationships should be implemented using inheritance.
C . Has-a relationships can be implemented using instance variables.
D . Is-a relationships can be implemented using the extends keyword.
E . Is-a relationships can be implemented using the implements keyword.
F . An array or a collection can be used to implement a one-to-many has-a relationship.
-
Which four are true?()
A . Has-a relationships should never be encapsulated.
B . Has-a relationships should be implemented using inheritance.
C . Has-a relationships can be implemented using instance variables.
D . Is-a relationships can be implemented using the extends keyword.
E . Is-a relationships can be implemented using the implements keyword.
F . An array or a collection can be used to implement a one-to-many has-a relationship.
G . The relationship between Movie and Actress is an example of an is-a relationship.
-
Which four are valid Oracle constraint types? ()
A . CASCADE
B . UNIQUE
C . NONUNIQUE
D . CHECK
E . PRIMARY KEY
F . CONSTANT
G . NOT NULL
-
Which four are true regarding the Workspace Manager in Oracle9i? ()
A . Automatically versions all tables.
B . Automatically installed with Oracle9i.
C . Merges changes with parent rows or discard changes.
D . Provides mechanism to identify and resolve conflicts.
E . Allows for version enabling tables by use of a packages procedure.
-
Which four are types of functions available in SQL? ()
A . string
B . character
C . integer
D . calendar
E . numeric
F . translation
G . date
H . conversio
-
You need to configure the DNS server to allow delivery of e-mail messages. Which four actions should you perform?()
A . Create a host (A) resource record for EX1.fourthcoffee.com on the internal DNS Server
B . Create a host (A) resource record for EX1.fourthcoffee.com on the external DNS Server
C . Create a host (A) resource record for EX3.fourthcoffee.com on the internal DNS Server
D . Create a host (A) resource record for EX3.fourthcoffee.com on the external DNS Server
E . Create a mail exchange (MX) resource record for EX1.fourthcoffee.com on the external DNS server. Set the preference to 10
F . Create a mail exchanger (MX) resource record for EX1.fourthcoffee.com on the internal DNS server. Set the preference to 10
G . Create a mail exchanger (MX) resource record for EX3.fourthcoffee.com on the external DNS server. Set the preference to 20
H . Create a mail exchanger (MX) resource record for EX3.fourthcoffee.com on the internal DNS server. Set the preference to 20
-
Which four are correct guidelines for naming database tables? ()
A . Must begin with either a number or a letter.
B . Must be 1-30 characters long.
C . Should not be an Oracle Server reserved word.
D . Must contain only A-Z, a-z, 0-+, _, *, and #.
E . Must contain only A-Z, a-z, 0-9, _, $, and #.
F . Must begin with a letter.
-
Which four are attributes of single row functions? ()
A . cannot be nested
B . manipulate data items
C . act on each row returned
D . return one result per row
E . accept only one argument and return only one value
F . accept arguments which can be a column or an expressio
-
Which four statements about an IP service level agreement (SLA) are true? ()
A . SLA responder knows type of operation, the port used, and duration.
B . SLA responder inserts in and out timestamps in the packet payload.
C . SLA sender and responder use the IP SLA Control Protocol to communicate with each other before
D . SLA sender and responder communication can be encrypted.
E . SLA sender and responder communication can be authenticated with MD5.
-
Which four service offerings are included in Oracle Public Cloud?()
A . Database Service
B . Data Service
C . Java Service
D . Security Service
E . .NET Service
F . SOA Service
-
Which four statements about the Carrier Supporting Carrier (CSC) feature are true? ()
A . MPLS is required between the PE and CE routers that connect the backbone carrier to the customer carrier.
B . The backbone carrier must enable the PE router to check that the packets it receives from the CErouter contain only the labels that the PE router advertised to the CE router.
C . Every packet that crosses the backbone carrier must be encapsulated so that the packet includes MPLS labels
D . AII PE routers that link the backbone carrier to the customer carrier must run Route Target Rewrite.
E . Arouting protocol is required between the PE and CE routers that connect the backbone carrierto thecustomer carrier. The routing protocol enables the customer carrier to exchange IGP routing information with the backbone carrier.
-
You are designing the site topology for the internal domain. Which action or actions should you perform?()
A . Create a Single Site.
B . Create a site for each physical location.
C . Set the replication interval on the default IP site link to 60 Minutes.
D . Configure the schedule of the default IP site link to only allow replication between the hours of 9:00 PM and 5:00 AM.
E . Configure the schedule of the default IP site link to only allow replication between the hours of 3:00 AM and 11:00 AM.
-
Which three actions are allowed in event details? ()(Choose three.)
A . Send
B . Raise
C . Delete
D . Receive
E . Acknowledge
-
Which four statments are true?()https://assets.asklib.com/images/image2/2018080111120075792.jpg
A . Raccoon is-a Mammal.
B . Raccoon has-a Mammal.
C . BabyRaccoon is-a Mammal.
D . BabyRaccoon is-a Raccoon.
E . BabyRaccoon has-a Mammal.
F . BabyRaccoon is-a BabyRaccoon.
-
Which four statements correctly describe functions that are available in SQL? ()
A . INSTR returns the numeric position of a named character.
B . NVL2 returns the first non-null expression in the expression list.
C . TRUNCATE rounds the column, expression, or value to n decimal places.
D . DECODE translates an expression after comparing it to each search value.
E . TRIM trims the heading or trailing characters (or both) from a character string.
F . NVL compares two expressions and returns null if they are equal, or the first expression if they are not equal.
G . NULLIF compares two expressions and returns null if they are equal, or the first expression if they are not equal.
-
Which four are components of the Cisco collaboration Architecture strategy?()
A . video
B . intercompany communications
C . covergence protocols
D . dedicated networking
E . clod computing
F . enterprise social networking
G . interoperability
-
Which three actions are required to configure the Flashback Database?()
A . set Flash Recovery Area
B . enable Flashback logging
C . create FLASHBACK tablespace
D . start the database in the ARCHIVELOG mode
E . start the database in the NOARCHIVELOG mode