-
What three statements are true about the various deployments of the 802.1x Extensible Authentication Protocol (EAP)?()
A . EAP-FAST has the ability to tie login with non-Microsoft user databases
B . EAP-TLS supports static passwords
C . PEAP supports one-time passwords
D . LEAP does not support multiple operating systems
E . LEAP supports Layer 3 roaming
F . PEAP does not work with WPA
-
Which two statements about SCSI are true? ()
A . The bus is limited to 32 devices
B . It is a full duplex serial standard
C . It is a half-duplex serial standard
D . It allows up to 320 MB/s of shared channel bandwidth
-
Which four statements about NetFlow are true?()
A . NetFlow records bidirectional IP traffic flow.
B . NetFlow export can be implemented over IPv4.
C . NetFlow export can be implemented over IPv6.
D . NetFlow records multicast IP traffic flow.
E . NetFlow records ingress traffic.
F . NetFlow records egress traffic.
-
Which statement is false about sales catalogs?()
A . Sales catalogs are used for customer display purposes.
B . With a sales catalog products can be placed in many locations.
C . If sales catalogs are used then it is not necessary to have a master catalog.
D . Sales catalogs can be used to target specific customer segments.
E . Sales catalogs can be used to control what products a customer can see.
-
Which three statements are true about policing?()
A . Out-of-profile packets are queued.
B . It causes TCP retransmits.
C . Marking and remarking are not supported.
D . It does not respond to BECN and foresight messages.
E . It uses a single- and two-bucket mechanism for metering.
-
Which two statements about zoning are correct? ()
A . Zoning increases security.
B . DNS queries are used for software zoning.
C . Software zoning is more secure than hardware zoning.
D . When using zones and VSANs together, the zone is created first.
E . Zoning requires that VSANs be established before it becomes operational.
-
Which statement about VPLS is true?()
A . All CE devices emulate a bridge
B . All provider devices emulate a bridge
C . Hierarchical VPLS reduces signaling overhead
D . Each PE device emulates a bridge
E . Each CE device emulates a bridge
-
Which statement about OSPF authentication is true?()
A . To enable OSPF authentication in a network, OSPF area 0 authentications must be enabled first
B . The payload of OSPF version 3 packets contains no authentication information
C . OSPF version 3 supports Advanced Encryption Standard
D . OSPF version 3 uses router ID as a key to encrypt OSPF hello packets
E . OSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP
-
Which three of these statements regarding 802.1Q trunking are correct?()
A . 802.1Q native VLAN frames are untagged by default.
B . 802.1Q trunking ports can also be secure ports.
C . 802.1Q trunks can use 10 Mb/s Ethernet interfaces.
D . 802.1Q trunks require full-duplex, point-to-point connectivity.
E . 802.1Q trunks should have native VLANs that are the same at both ends.
-
Which statement regarding 802.1X is true?()
A . 802.1X is simple to implement on any workstation.
B . 802.1X requires access-lists to allow IP voice traffic across.
C . Authentication is initiated when the workstation connects to an Ethernet port.
D . 802.1X requires HTTP access to initiate authentication.
-
Which three of these statements regarding 802.1Q trunking are correct?()
A . 802.1Q native VLAN frames are untagged by default.
B . 802.1Q trunking ports can also be secure ports.
C . 802.1Q trunks can use 10 Mb/s Ethernet interfaces.
D . 802.1Q trunks require full-duplex, point-to-point connectivity.
E . 802.1Q trunks should have native VLANs that are the same at both ends.
-
Which statement about NPIV is true?()
A . NPIV provides a means to assign multiple Fibre Channel IDs to a single N-port.
B . NPIV can be enabled on a per-VSAN basis.
C . NPIV requires a "write erase" and then reload the switch in order to come up into NPIV mode.
D . NPIV is a Cisco proprietary feature and as such works only between two Cisco switches.
E . NPIV must not be enabled on a switch that is also running N-port virtualization.
-
The Company network utilizes the Multiple-instance Spanning Tree protocol in its switched LAN. Which three statements about the MST protocol (IEEE 802.1S) are true? ()
A . To verify the MST configuration, the show pending command can be used in MST configuration mode.
B . When RSTP and MSTP are configured; UplinkFast and BackboneFast must also be enabled.
C . All switches in the same MST region must have the same VLAN-to-instance mapping, but different configuration revision numbers.
D . All switches in an MST region, except distribution layer switches, should have their priority lowered from the default value 32768.
E . An MST region is a group of MST switches that appear as a single virtual bridge to adjacent CST and MST regions.
F . Enabling MST with the "spanning-tree modemst" global configuration command also enables RSTP.
-
pany has implemented 802.1X authentication as a security enhancement. Which statement is true about 802.1x port-based authentication?()
A . TACACS+ is the only supported authentication server type.
B . If a host initiates the authentication process and does not receive a response, it assumes it is not authorized.
C . RADIUS is the only supported authentication server type.
D . Before transmitting data, an 802.1x host must determine the authorization state of the switch.
E . Hosts are required to havea 802.1x authentication client or utilize PPPoE.
F . None of the other alternatives apply.
-
Which two statements are true about 802.1s?()
A . 802.1s supports a reduced number of spanning-tree instances.
B . 802.1s has better convergence times than 802.1w.
C . 802.1s does not support load balancing over the same physical topology.
D . The CPU utilization for 802.1s is lower than the CPU utilization for 802.1w.
-
What three statements are true about the various deployments of the 802.1x Extensible Authentication Protocol (EAP)? ()
A . EAP-FAST has the ability to tie login with non-Microsoft user databases
B . EAP-TLS supports static passwords
C . PEAP supports one-time passwords
D . LEAP does not support multiple operating systems
E . LEAP supports Layer 3 roaming
F . PEAP does not work with WPA·
-
Which statement about RIPng is true?()
A . RIPng allows for routes with up to 30 hops.
B . RIPng is enabled on each interface separately.
C . RIPng uses broadcasts to exchange routes.
D . There can be only one RIPng process per router.
-
Which statement is true about vishing?()
A . Influencing users to forward a call to a toll number (for example, a long distance or international number)
B . Influencing users to provide personal information over a web page
C . Using an inside facilitator to intentionally forward a call to a toll number (for example, a long distance orinternational number)
D . Influencing users to provide personal information over the phone
-
Which statements about inheritance are true?()
A . In Java programming language only allows single inheritance.
B . In Java programming language allows a class to implement only one interface.
C . In Java programming language a class cannot extend a class and implement a interface together.
D . In Java programming language single inheritance makes code more reliable.
-
Which statements are true about checkpointing()
A . The checkpoint frequency decreases with the smaller redo log file size.
B . It ensures that all committed data is written to the data files during normal shutdown.
C . The frequent full checkpoint in a database can cause the overall degradation of the database performance.
D . It prompts the Checkpoint (CKPT) process to write data to the data files and redo information to the onlineredo log file
-
The Company wireless network is using 802.11G access points. Which two statements are true about these access points? ()
A . It supports eight different data rates.
B . It is fully backward compatible with 802.11b
C . It provides the same network throughput with 802.11b clients, 802.11g clients, or a mixed environment where both clients are present.
D . It is only compatibly with the 11 Mbps 802.11b transfer rate.
E . It has three non-overlapping channels in its channel options.
-
Which of following statements about intercultural ...
Which of following statements about intercultural and international business are true?
A.With some awareness of it, business people are able to understand the norms, customs, values and beliefs of another culture.
B.It mainly focuses on business trade between companies from different countries or cultures.
C.It chiefly concerns how people from different countries or cultures communicate with each other.
D.In the communication related to it, business people are supposed to adapt themselves to such a context and environment.
-
Which statement about gluconeogenesis is FALSE()
A.For starting materials, it can use carbon skeletons derived from certain amino acids
B.It consists entirely of the reactions of glycolysis, operating in the reverse direction
C.It employs the enzyme glucose 6-phosphatase
D.It is one of the ways that mammals maintain normal blood glucose levels
-
Which statement about ethanol is correct()
A.AIt burns in air to form ethene and water
B.BIt is prepared from ethene by fermentation
C.CIt is prepared from glucose in an addition reaction
D.DIt is the only product when ethene reacts with steam