-
In which two ways do TANDBERG and Cisco TelePresence solutions interoperate? ()
A . gated
B . integrated
C . bridged
D . converted
E . spanned
-
In which two ways does the BGP graceful capability preserve prefix information during a restart?()
A . The peer router immediately removes the BGP routers that it learned from the restarting router from itsBGP routing tables.
B . The router establishes BGP sessions with other routers and relearns the BGP routes from others that are also capable of graceful restart. The restarting router waits to receive updates from the neighboringrouters. When the neighboring routers send end-of-RIB messages to indicate that they are donesending updates,the restarting router starts sending its own updates.
C . The peer router sends an end-of-RIB message to the restarting router.
D . The restarting router removes any stale prefixes after the timer for stale entries expires.
E . The restarting router does not remove any stale prefixes after the timer for stale entries expires.
-
Which two of these are ways that cisco capital helps partners?()
A . counts as double toward quarterly sales goals
B . expands customer relationships
C . require customers to lease or buy new equipment when the lease expires
D . increases the customer capital budget
E . increases marginsand cash flow
-
Which two ways does an integrated security solution reduce TCO? ()
A . by enabling business to leverage investments in the network
B . by spending less time addressing attacks
C . by enforcing policy compliance
D . through admission control
-
ackie wants to remove an action hotspot but leave the image on his video form , in which one of the following ways can he do this ?()
A . delete the image and reinsert it into the form
B . select the hotspot and choose the hotspot->remove hotspot menu command
C . highlight the hotspot and choose the design-> hotspot->remove menu command
D . select the hotspot and choose the design->hotspot->remove hotspot menu command
-
What are two ways in which the Cisco Security Monitoring, Analysis, and Response System provides superior network protection? ()
A . reports financial losses from attacks
B . providessecutiy command and control
C . provides VPN connectivity to clients
D . expedites reporting of incidents
E . manage rogue wireless signal
-
Every lifeboat which is fitted with a fixed two-way VHF radiotelephone apparatus with()which is separately mounted shall be provided with arrangements for sitting and securing the antenna effectively in is operating position.
A . a dummy antenna
B . a supporting facilities
C . a back-up equipment
D . an antenna
-
Which two tunneling techniques in IPv6 do not require an IPv4 tunnel destination in the configuration?()
A . 6to4
B . 6over4
C . ISATAP
D . GRE
-
In which two ways does an integrated security solution reduce TCO? ()
A . by enabling businesses to leverage investments in the network
B . by spending less time addressing attacks
C . by enforcing policy compliance
D . through admission control
-
Every lifeboat which is fitted with a fixed two-way()radiotelephone apparatus with an antenna which is separately mounted shall be provided with arrangements for sitting and securing the antenna effectively in its operating position.
A . HF
B . VHF
C . MF
D . MF/HF
-
Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? ()
A . Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot
B . UDLD protects against STP failures caused by cabling problems that create one-way links.
C . Loop guard detects and protects against duplicate packets being received and transmitted on different ports
D . UDLD protects against unidirectional cabling problems on copper and fiber media.
E . Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.
-
Which one of two crossing power-driven vessels has the right of way in a fog().
A、 Both vessels
B、 Neither vessel
C、The vessel on portside
D、 The vessel on starboard side
-
You are working on a database that must be functioning 24 hours a day, 7 days a week. The database isconfigured in ARCHIVELOG mode. Which two options do you have for performing user-managed backups()
A . You can perform consistent backups only.
B . You can perform a complete database backup without shutting down the database instance.
C . You can back up data files only when all data files have the same SCN recorded in the control file.
D . You can back up only those data files whose headers are frozen by using ALTER TABLESPACE BEGINBACKUP or ALTER DATABASE BEGIN BACKUP command
-
Derek has created a view in the sales.nsf db. Derek wants the sales value column in the view to be punctuated to display two decimal places . which one of the following should he do?()
A . use the @function @decimal in the column formula in the view
B . select decimal on the numbers tab in the view properties box
C . select decimal on the numbers tab in the column properties box
D . use the @function @decimal to format the value in the field on the form that will display in the view&e
-
In which two ways does the BGP graceful restart capability preserve prefix information during a restart?()
A . The peer router sends an end-of RIB message to the restarting router
B . The peer router immediately removes the BGP routes that it learned from the restarting router from its BGP routing table
C . The restarting router does not remove any stale prefixes after the timer for stale entries expires
D . The router establishes BGP sessions with other routers and relearns the BGP routes from other routers that are also capable of graceful restart. The restarting router waits to receive updates from the neighboring routers. When the neighboring routers send end-of-RIB messages to indicate that they are done sending updates, the restarting router starts sending its own updates
E . The restarting router removes any stale prefixes after the timer for stale entries expire
-
Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention?()
A . Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot.
B . UDLD protects against STP failures caused by cabling problems that create one-way links.
C . Loop guard detects and protects against duplicate packets being received and transmitted on different ports.
D . UDLD protects against unidirectional cabling problems on copper and fiber media.
E . Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.
-
You are working on a database that must be functioning 24 hours a day, 7 days a week. The databaseis configured in ARCHIVELOG mode. Which two options do you have for performing user-managed backups()
A . You can perform consistent backups only.
B . You can perform a complete database backup without shutting down the database instance.
C . You can back up data files only when all data files have the same SCN recorded in the control file.
D . You can back up only those data files whose headers are frozen by using ALTER TABLESPACE BEGINBACKUP or ALTER DATABASE BEGIN BACKUP commands.
-
1.Why do people express similar ideas in different ways?
-
Explain two ways in which public speaking and conversation differ, and two ways in which they are similar.
-
The simplest animals are those whose bodies are simplest in structure and which do the things done by all living animals, such as eating, breathing, moving and feeling, in the most_______way.
A.bizarre
B.primitive
C.advantageous
D.unique
-
You need to generate a list of all customer last names with their credit limits from the CUSTOMERS table. Those customers who do not have a credit limit should appear last in the list. Which two queri
A.SELECT?cust_last_name,?cust_credit_limit?FROM?customers?ORDER?BY?cust_credit_limit?DESC
B.SELECT?cust_last_name,?cust_credit_limit?FROM?customers?ORDER?BY?cust_credit_limit
C.SELECT?cust_last_name,?cust_credit_limit?FROM?customers?ORDER?BY?cust_credit_limit?NULLS?LAST
D.SELECT?cust_last_name,?cust_credit_limit?FROM?customers?ORDER?BY?cust_last_name,?cust_credit_limit?NULLSLAST
-
I personally am offended by what they have tried to do in a very misleading way with, what I've said about two of my personal______, President Kennedy and Dr. Martin Luther King Jr..
A.resemblance
B.statues
C.icons
D.parable
-
Software maintenance is to do necessary modification, supplement, and completeness during software life circle.Among the following vary kinds of maintenance, which one has the maximum workload in a general way?
A.relevance maintenance
B.completeness maintenance
C.correctness maintenance
D.other kinds of maintenance
-
{TSE}Text 3 I had an experience some years ago which taught me something about the ways in which peoplemake a bad situation worse by blaming themselves. One January, I had to officiate at two funerals onsuccessive days for two elderly women in my communi
A、They lived out a natural life
B、They died of exhaustion after the long plane ride
C、They weren’t accustomed to the change in weather
D、They died due to lack of care by family members