-
Identify two correct statements to complete the sentance. In a Coherence implementation, it is a best practice to implement PortableObject on all customer objects because:()
A . it leverages Java’s built-in serialization
B . it provides a more efficient serialization of the object
C . it allows the object to be shared across applications
D . it allows the object to be shared across programming platform
-
You need to design the VLAN scheme for the Company network. Which two statements are true about best practices in VLAN design?()
A . Routing should occur at the access layer ifvoice VLANs are utilized. Otherwise, routing should occur at the distribution layer.
B . Routing should always be performed at the distribution layer.
C . VLANs should be localized to a switch.
D . VLANs should be localized to a single switch unlessvoice VLANs are being utilized.
E . Routing should not be performed between VLANs located on separate switches.
-
Which firewall best practices can help mitigate worm and other automated attacks?()
A . Segment security zones
B . Restrict access to firewalls
C . Use logs and alerts
D . Set connection limit
-
Which three best practices should be implemented at the campus backbone submodule to support the server farm module?()
A . Implement highly redundant switching and links with no single points or paths of failure.
B . Implement server load balancing.
C . Implement the Hot Standby Router Protocol (HSRP) for failover protection.
D . Implement intrusion detection with automatic notification of intrusion attempts in place.
-
Which three items are Cisco best-practice recommendations for securing a network?()
A . Routinely apply patches to operating systems and applications
B . Disable unneeded services and ports on hosts
C . Deploy HIPS software on all end-user workstations
D . Require strong passwords and enable password expiratio
-
When implementing 802.1X on Teleworker routers and using separate DHCP address pools for Teleworker and Home-user devices, traffic between devices can be restricted. How can you best accomplish this?()
A . Access Lists between the inside interface and loopback interface
B . Context Based Access Control
C . Dynamic Host Configuration Protocol
D . Network Address translatio
-
When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()
A . RFC 1149
B . RFC 3704
C . RFC 1918
D . RFC 2827
-
Refer to the exhibit. On the basis of the information provided in the exhibit, which two sets of procedures are best practices for Layer 2 and 3 failover alignment?()https://assets.asklib.com/images/image2/2018072410174774893.jpg
A . Configure the D-SW1 switch as the active HSRP router and the STP root for all VLANs. Configure the D-SW2 switch as the standby HSRP router and backup STP root for all VLANs.
B . Configure the D-SW1 switch as the standby HSRP router and the STP root for VLANs 11 and 110. Configure the D-SW2 switch as the standby HSRP router and the STP root for VLANs 12 and 120.
C . Configure the D-SW1 switch as the active HSRP router and the STP root for VLANs 11 and 110. Configure the D-SW2 switch as the active HSRP router and the STP root for VLANs 12 and 120.
D . Configure the D-SW2 switch as the active HSRP router and the STP root for all VLANs. Configure the D-SW1 switch as the standby HSRP router and backup STP root for all VLANs.
E . Configure the D-SW1 switch as the active HSRP router and the backup STP root for VLANs 11 and 110. Configure the D-SW2 switch as the active HSRP router and the backup STP root for VLANs 12 and 120.
F . Configure the D-SW1 switch as the standby HSRP router and the backup STP root for VLANs 12a nd 120. Configure the D-SW2 switch as the standby HSRP router and the backup STP root for VLANs 11 and 110.
-
Which option is best practice for creating a recovery catalog owner in the catalog database?()
A . Granting UNLIMITED QUOTA on the SYSTEM tablespace to the owner
B . Allocating the SYSTEM tablespace as the default tablespace and granting the SYSDBA privilege to the user
C . Creating a new tablespace,allocating this as the default, and granting UNLIMITED QUOTA on this tablespace to the user
D . Allocating the SYSAUX tablespace as the default tablespace and granting UNLIMITED QUOTA on this tablespace to the user
-
Which option is best practice for creating a recovery catalog owner in the catalog database?()
A . Granting UNLIMITED QUOTA on the SYSTEM tablespace to the owner
B . Allocating the SYSTEM tablespace as the default tablespace and granting the SYSDBA privilege to the user
C . Creating a new tablespace, allocating this as the default, and granting UNLIMITED QUOTA on this tablespace to the user
D . Allocating the SYSAUX tablespace as the default tablespace and granting UNLIMITED QUOTA on this tablespace to the user
-
What are BCP 38 (Best Common Practices 38)/RFC 2827 Ingress Packet Filtering Principles?()
A . Filter Smurf ICMP packets.
B . Filter as close to the core as possible
C . Filter as close to the edge as possible
D . Filter as precisely as possible
E . Filter both source and destination where possible
-
What is a site survey best practice for location-based services?()
A . 20 percent cell overlap
B . four access points detecting a client at -76 dBm or better
C . 10 percent cell overlap
D . three access points detecting a client at -75 dBm or better
-
In requirements engineering, requirements elicitation is the practice of collecting the requirements of a system from users, customers and other stakeholders. In the following practices, () is rarely used in requirements elicitation.
A . brain storming
B . interview
C . questionnaire
D . Monte Carlo analysis
-
You are implementing basic switch security best practices. Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()
A . Make all ports private VLAN ports.
B . Place all unused ports in native VLAN 1 until needed.
C . Proactively configure unused switch ports as access ports.
D . Disable Cisco Discovery Protocol globally.
-
Company.com moved their application start routines from the inittab and place them under HACMP control. During testing,the applications did not always start as desired. What is the best practice for the application start routines.()
A . Assume the system was stopped by a failure.
B . Ensure the hostname parameters is set correctly.
C . Assume the system was stopped by a graceful shutdown.
D . Mount all volumes and file systems before running the application.
-
A company wants to buy memory efficiently on their p5 590 to allow for the best performance. What is the best practice for adding memory for performance?()
A . Install more cards of smaller capacity and same size across MCMs. Use DDR2(dual data rate) memory if using HPC (High Performance Computing).
B . Install fewer cards of larger capacity of the same size across MCMs. Servers with one processor book must have a minimum of four memory cards installed.
C . Intermix DDR1 and DDR2 memory so that partitions requiring the higher performance can take advantage of them. Half of the available memory slots in the system should contain memory.
D . Use fewer higher density memory cards so that a few memory slots are left open for future growth. Each processor book provides sixteen memory card slots. The p5 590 supports a maximum of 64 memory cards.
-
Which three best practices should be implemented at the campus backbone submodule to supportthe server farm module? ()
A . Implement highly redundant switching and links with no single points or paths of failure.
B . Implement server load balancing.
C . Implement the Hot Standby Router Protocol (HSRP) for failover protection.
D . Implement intrusion detection with automatic notification of intrusion attempts in place.
-
Best practices would have no single point of failure between mirrored resources. In setting up virtual, internal boot disks for two client LPARs, how would this be accomplished?()
A . Have one VIO server with striped disks for all LPARs
B . Have one VIO server with mirrored disks for all LPARs
C . Have two VIO servers with each LPAR accessing both VIO servers
D . Have two VIO servers with each LPAR accessing a different VIO server
-
It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()
A . IPSec
B . IPSec with GRE
C . DMVPN
D . EZVPN
E . all of the choice
-
Doing lots of listening practice is one of _______ best ways of becoming _______ good language learner.
-
The following aims of nursing practice are all true except for
-
An administrator needs to authenticate users to the network, authorize network activities, andaccount for activities done.Which of the following are services that will BEST meet these goals?()(Select TWO).
A.TACACS+
B.RADIUS
C.Kerberos
D.802.1X
E.RRAS
-
Because it takes longer to install and involves some tinkering to get it to work just right, it's best for more experienced users. But, oh, what joy! ______ a detailed log of every ad it annihilates, ______ it makes a satisfying 'thunk' when it nabs o
A.Not only Killer keeps, but also
B.Not only does Killer keep
C.Only Killer keeps, and
D.Only if Killer keeps
-
Coca-Cola is the best known brand name in the world. The name has a high-perceived quality and high brand loyalty among soft drink users. The company has developed the brand name for over 100 years. Coca-Cola has a valuable:
A.evoked set
B.brand quality standard
C.perceptual map
D.brand equity