-
The SQL Tuning Advisor configuration has default settings in your database instance. Which recommendation is automatically implemented after the SQL Tuning Advisor is run as part of the automatic maintenance task?()
A . statistics recommendations
B . SQL Profile recommendations
C . Index-related recommendations
D . restructuring of SQL recommendatio
-
Company.com has decided to implement the "Fast Disk Takeover" and "Disk Heart Beat" features of HACMP. What IBM distribution media will be required for a default installation?()
A . AIX media only
B . HACMP media only
C . AIX and HACMP media
D . HACMP and Concurrent Resource Manager media
-
In order to enhance worker productivity, a Cisco wireless network has been implemented at all locations. Which three statements regarding WLAN are true?()
A . A WLAN client will operate in half-duplex mode.
B . The Aironet 1230 access point is an example of an access point that operates solely as a lightweight access point.
C . Ad hoc mode allows mobile clients to connect directly without an intermediate AP.
D . WLANs are designed to share the medium and can easily handle an increased demand of channel contention.
E . A lightweight AP receives control and configuration from a WLAN controller to which it is associated.
F . Another term for infrastructure mode is independent service set (IBSS).
-
CDE is working. However, the customized PATH environment has not been implemented. Which of the following procedures should be performed to activate the implementation?()
A . Update the .kshrc file
B . Edit $HOME/.dtprofile, and uncomment the DTSOURCEPROFILE=true
C . Copy /etc/.profile to $HOME/.dtprofile and edit the file as needed
D . Double click on the System Administration icon and select CDE profile
-
Cisco IOS XR has implemented a nonstop routing feature so that when RP failover occurs, the routinginformation can be recovered locally. Which protocol does not support the NSR feature?()
A . OSPF
B . LDP
C . BGP
D . IS-IS
E . RSVP
-
Inter-VLAN routing has been implemented in the Company network. In VLAN routing, what are some of the disadvantages of designing a router-on-stick configuration? ()
A . InterVLAN routing cannot be filtered by the router.
B . The router becomes a single point of failure for the network.
C . Routers will not route STP BPDUs.
D . There is a possibility of inadequate bandwidth for each VLAN.
E . Additional overhead on the router can occur.
F . NetFlow Switching is required for InterVLAN accounting.
-
A customer has two separate storage networks and is planning to implement an SVC to provide for FlashCopy between the two networks. What is the minimum number of ISL ports required?()
A . 0
B . 1
C . 2
D . 4
-
pany has implemented 802.1X authentication as a security enhancement. Which statement is true about 802.1x port-based authentication?()
A . TACACS+ is the only supported authentication server type.
B . If a host initiates the authentication process and does not receive a response, it assumes it is not authorized.
C . RADIUS is the only supported authentication server type.
D . Before transmitting data, an 802.1x host must determine the authorization state of the switch.
E . Hosts are required to havea 802.1x authentication client or utilize PPPoE.
F . None of the other alternatives apply.
-
A programmer has an algorithm that requires a java.util.List that provides an efficient implementation of add(0,object), but does NOT need to support quick random access. What supports these requirements?()
A . java.util.Queue
B . java.util.ArrayList
C . java.util.LinearList
D . java.util.LinkedList
-
A customer needs to implement a Highly Available solution for JMS that has a primary data center and a backup. Which three steps would you perform when designing your solution?()
A . Store Transaction Logs in a database and use Database stores for JMS to make replication between sites easier.
B . Use file based Transaction Logs and JMS stores and implement a separate replication solution for files in addition to database in case database replication fails.
C . Implement Oracle RAC at each site to provide a highly available solution within each datacenter.
D . Configure Whole Server Migration to migrate WebLogic Managed Servers from the primary to the secondary site.
E . Configure Automatic Service Migration for JMS high availability within a datacenter.
-
The SQL Tuning Advisor configuration has default settings in your database instance. Which recommendation is automatically implemented after the SQL Tuning Advisor is run as part of the automatic maintenance task?()
A . statistics recommendations
B . SQL Profile recommendations
C . Index-related recommendations
D . restructuring of SQL recommendatio
-
VOIP has been implemented at the main office of the Company network. Which two statements are true about voice packets in a LAN?()
A . Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of the VoIP communication.
B . Voice traffic data flow involves large volumes of large packets.
C . Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.
D . Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.
E . Voice packets are very sensitive to delay and jitter.&e
-
A customer plans to implement SVC as part of a solution and has concerns regarding the resilience of the SVC architecture. The correct response to this concern is that SVC().
A . is stateless with global referencing of metadata
B . is based on cluster architecture with externally provided quorum disks
C . is based on cluster architecture, with quorum held internally on the first cluster node
D . is based on grid architecture, with each node holding a full mirror configuration for all other node
-
A programmer has an algorithm that requires a java.util.List that provides an efficient implementation of add(0, object), but does NOT need to support quick random access. What supports these requirements?()
A . java.util.Queue
B . java.util.ArrayList
C . java.util.LinearList
D . java.util.LinkedList
-
What are two advantages that the Cisco SA 520 all-in-one UTM security device has over implementing a typical router in a small business network?()
A . Cisco Intrusion Prevention System
B . higher bandwidth
C . virtual private networks
D . access control lists
E . URL filtering
-
A customer has two separate storage islands and is planning to implement an SVC to provide forFlashCopy between the two islands. What is the minimum number of inter-switch links (ISLs) thatare required?()
A . 0
B . 1
C . 2
D . 4
-
pany is implementing 802.1X in order to increase network security. In the use of 802.1X access control, which three protocols are allowed through the switch port before authentication takes place? ()
A . EAP-over-LAN
B . EAP MD5
C . STP
D . protocols not filtered by an ACL
E . CDP
F . TACACS+
-
Company.com has decided to implement VPN for all network traffic. How might this might affect HACMP?()
A . Only the heartbeat IP network can exist in a VPN style network.
B . HACMp must have separate VPN’s for all ’non-service’ and ’service’ adapter networks.
C . If a VPN is used for IP traffic the heartbeating must be done over disk connections.
D . HACMP can exist in a VPN network environment,but special considerations must be addressed.
-
helga is working with a multi-value field that has numeric values in a list. she would like to apply a formula to each item in the list, return the list which one of the following @fuctions can she use to accomplish this with one line of code?()
A . @transform
B . @Listprocess
C . @processlist
D . @listevaluate
-
The DAI feature has been implemented in the Company switched LAN. Which three statements are true about the dynamic ARP inspection (DAI) feature? ()
A . DAI can be performed on ingress ports only.
B . DAI can be performed on both ingress and egress ports.
C . DAI is supported on access ports, trunk ports, EtherChannel ports, and private VLAN ports.
D . DAI should be enabled on the root switch for particular VLANs only in order to secure the ARP caches of hosts in the domain.
E . DAI should be configured on all access switch ports as untrusted and on all switch ports connected to other switches as trusted.
F . DAI is supported on access and trunk ports only.
-
A part program is stored in the form of blocks of information, and each block has the numerical data needed to manufacture a segment of the work-piece.
-
A part program is stored in the form of blocks of information, and each block has the numerical data needed to manufacture a segment of the work-piece.
-
The______beauty of the mountain has made it a world-famous resort. Every year numerous tourists from home and abroad come to visit it.
A.perpetual
B.perplexed
C.preserved
D.perished
-
In recent years, Microsoft has focused on three big tasks: building robust security into its software, resolving numerous antitrust complaints against it and upgrading its Windows operating system. These three tasks are now starting to collide.
On August 27th the firm said that the successor to its Windows XP operating system, code-named Longhorn, will go on sale in 2007 without one of its most impressive features, a technique to integrate elaborate search capabilities into nearly all desktop applications. (On the bright side, Longhorn will contain advances in rendering images and enabling different computing platforms to exchange data directly between applications.) It is a big setback for Microsoft, which considers search technology a pillar of its future growth—not least as it competes against Google.
The firm's focus on security championed by Bill Gates himself—took resources away from Longhorn, admits Greg Sullivan, a lead product manager in the Windows client division. Programmers have been fixing Windows XP rather than working on Longhorn. In mid-August, Microsoft released Service Pack 2, a huge set of free software patches and enhancements to make Windows XP more secure. Though some of the fixes turned out to have vulnerabilities of their own, the patches have mostly been welcomed. Microsoft's decision to forgo new features in return for better security is one that most computer users will probably applaud.
Yet ironically, as Microsoft slowly improves the security of its products-by, for instance, incorporating firewall technology, anti-virus systems and spam filters its actions increasingly start to resemble those that, in the past, have got the firm into trouble with regulators. Is security software an "adjacent software market", in which case Microsoft may be leveraging its dominance of the operating system into it? Integrating security products into Windows might be considered "bundling" which, with regard to web browsing, so excited America's trustbusters in the 1990s. And building security directly into the operating system seems a lot like "commingling" software code, on which basis the European Commission ruled earlier this year that Microsoft abused its market power through the Windows Media Player. Microsoft is appealing against that decision, and on September 30th it will argue for a suspension of the commission's remedies, such as the requirement that it license its code to rivals.
Just last month, the European Union's competition directorate began an investigation into Microsoft and Time Warner, a large media firm, on the grounds that their proposed joint acquisition of Content Guard, a software firm whose products protect digital media files, might provide Microsoft with, undue market power over digital media standards. The commission will rule by January 2005. Microsoft, it seems, in security as elsewhere, is going to have to get used to being punished for its success. Its Windows monopoly lets it enjoy excessive profits but the resulting monoculture makes it an obvious target for viruses and regulators alike.
That Microsoft's three tasks are colliding is reflected in the fact that ______.
A.the new operating system will be marketed at a discount
B.search will be removed from the new operating system
C.all search capabilities will be combined into the desktop
D.images and data will be exchanged more directly