网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which two characteristitcs describe the UDP protocol?()
- A、limited error checking
- B、defined timers
- C、no recovery mechanisms
- D、three-way handshake
参考答案
更多 “Which two characteristitcs describe the UDP protocol?()A、limited error checkingB、defined timersC、no recovery mechanismsD、three-way handshake” 相关考题
考题
Which two statements accurately describe an IBGP peering session?() (Choose two.)
A. Peers are statically defined.B. Peers exist within the same AS.C. Peers must be directly connected to each other.D. Peers advertise routes learned from other IBGP neighbors.
考题
Which three statements describe the User Datagram Protocol (UDP)?()
A.UDP provides delivery notification and error checking mechanisms.B.UDP is faster than the Transmission Control Protocol (TCP).C.UDP application examples include DNS and VoIP.D.UDP is an application layer protocol.E.UDP uses a best effort delivery approach.
考题
Which three statements describe the Transmission Control Protocol (TCP)?()
A.TCP is a transport layer protocol.B.TCP is faster than the User Datagram Protocol (UDP).C.TCP provides delivery notification and error checking mechanisms.D.TCP uses a best effort delivery approach.E.TCP application examples include HTTP and SMTP.
考题
Which two characteristitcs describe the UDP protocol?()
A. limited error checkingB. defined timersC. no recovery mechanismsD. three-way handshake
考题
HSRP. Known as Hot Stanclby Router Protocol, is a Cisco proprietarv redundancy protocol . As an experienced network administrator, you are required to configure HSRP on a XYZ network.Which TWO of the following wii be available and shared between the routers configured with HSRP? ()(Choose two.)A. a shared single interfaceB. the ability to track serial interfacesC. UDP-based hello packetsD. the impact of flapping links if timers are too low
考题
You review the Failed Attempts logs on an AAA server and find: "unknown network access servererror." Which failure could produce this error?()A、AAA client and AAA server handshake failureB、supplicant authentication failureC、wrong password used by the supplicantD、failure of the wireless client and AAA server handshake
考题
HSRP. Known as Hot Stanclby Router Protocol, is a Cisco proprietarv redundancy protocol . As an experienced network administrator, you are required to configure HSRP on a XYZ network. Which TWO of the following wii be available and shared between the routers configured with HSRP? ()(Choose two.)A、a shared single interfaceB、the ability to track serial interfacesC、UDP-based hello packetsD、the impact of flapping links if timers are too low
考题
Which feature is a potential security weakness of a traditional stateful firewall?()A、It cannot support UDP flows.B、It cannot ensure each TCP connection follows a legitimate TCP three-way handshake.C、It cannot detect application-layer attacks.D、The status of TCP sessions is retained in the state table after the sessions terminate.
考题
Which two characteristics describe the UDP protocol?()A、limited error checkingB、defined timersC、no recovery mechanismsD、three-way handshake
考题
Which IS-IS authentication method is supported on the ERX Edge Router?()A、simple passwordB、HMAC message digest 5C、Password Authentication ProtocolD、Challenge Handshake Authentication Protocol
考题
Which three statements describe the User Datagram Protocol (UDP)?()A、UDP provides delivery notification and error checking mechanisms.B、UDP is faster than the Transmission Control Protocol (TCP).C、UDP application examples include DNS and VoIP.D、UDP is an application layer protocol.E、UDP uses a best effort delivery approach.
考题
Which of the following is a connectionless transport layer protocol?()A、 TCPB、 HTTPC、 SMTPD、 UDP
考题
You review the failed attempts logs on an aaa server and find: "unknown network access server error." Which failure could produce this error?()A、aaa client and aaa server handshake failureB、supplicant authentication failureC、wrong password used by the supplicantD、failure of the wireless client and aaa server handshake
考题
Which two statements accurately describe an IBGP peering session?() (Choose two.)A、Peers are statically defined.B、Peers exist within the same AS.C、Peers must be directly connected to each other.D、Peers advertise routes learned from other IBGP neighbors.
考题
When an emulated error notification method is complete, an administrator can view the error log By typing the errpt command to be sure the emulation took place. To verify that the error log entry is the result of the emulated event,the log entry resource name is set to EMULATOR,or which of the following?() A、 A user defined Resource NameB、 A cluster defined Resource NameC、 An error daemon specific Resource NameD、 A Resource Name generated by Automatic Error Notification
考题
Which three statements describe the Transmission Control Protocol (TCP)?()A、TCP is a transport layer protocol.B、TCP is faster than the User Datagram Protocol (UDP).C、TCP provides delivery notification and error checking mechanisms.D、TCP uses a best effort delivery approach.E、TCP application examples include HTTP and SMTP.
考题
Your database operates in ARCHIVELOG mode and all the tablespaces are online. Due to a user error, you decided to perform an incomplete recovery. Which two tasks would you be required to perform in the recovery process?()A、 open the database with the RESTRICTED optionB、 open the database with the RESETLOGS optionC、 recover to the required SCN only that data file in which the error occurredD、 recover all the data files to the same system change number (SCN)
考题
An RMAN backup job fails, displaying the following error: ORA/x7f19809: limit exceeded for recovery files Your analysis shows that the Flash Recovery area is full. Which two actions could you take to resolve the error and avoid this error in future?()A、take the backup of the flash recovery area less frequentlyB、increase the value of the UNDO_RETENTION initialization parameterC、change the value of the WORKAREA_SIZE_POLICY initialization parameter to AUTOD、change the backup retention policy to retain the backups for a smaller period of time E、increase the value of the DB_RECOVERY_FILE_DEST_SIZE initialization parameterF、increase the value of the CONTROL_FILE_RECORD_KEEP_TIME initialization parameter
考题
Your database operates in ARCHIVELOG mode and all the tablespaces are online. Due to a user error, you decided to perform an incomplete recovery. Which two tasks would you be required to perform in the recovery process? ()A、open the database with the RESETLOGS optionB、open the database with the RESTRICTED optionC、recover all the data files to the same system change number (SCN)D、recover to the required SCN only that data file in which the error occurred
考题
多选题An RMAN backup job fails, displaying the following error: ORA/x7f19809: limit exceeded for recovery files Your analysis shows that the Flash Recovery area is full. Which two actions could you take to resolve the error and avoid this error in future?()Atake the backup of the flash recovery area less frequentlyBincrease the value of the UNDO_RETENTION initialization parameterCchange the value of the WORKAREA_SIZE_POLICY initialization parameter to AUTODchange the backup retention policy to retain the backups for a smaller period of timeEincrease the value of the DB_RECOVERY_FILE_DEST_SIZE initialization parameterFincrease the value of the CONTROL_FILE_RECORD_KEEP_TIME initialization parameter
考题
多选题An RMAN backup job fails, displaying the following error: ORA-19809: limit exceeded for recovery files Your analysis shows that the Flash Recovery area is full. Which two actions could you take to resolve the error and avoid this error in the future? ()Atake the backup of the flash recovery area less frequentlyBincrease the value of the UNDO_RETENTION initialization parameterCchange the value of the WORKAREA_SIZE_POLICY initialization parameter to AUTODchange the backup retention policy to retain the backups for a smaller period of timeEincrease the value of the DB_RECOVERY_FILE_DEST_SIZE initialization parameterFincrease the value of the CONTROL_FILE_RECORD_KEEP_TIME initialization parameter
考题
单选题Which feature is a potential security weakness of a traditional stateful firewall?()A
It cannot support UDP flows.B
It cannot ensure each TCP connection follows a legitimate TCP three-way handshake.C
It cannot detect application-layer attacks.D
The status of TCP sessions is retained in the state table after the sessions terminate.
考题
多选题Which three protocols use UDP as a transport protocol by default?()AHTTPBTFTPCDNSDSNMPESMTP
考题
多选题Which three statements describe the User Datagram Protocol (UDP)?()AUDP provides delivery notification and error checking mechanisms.BUDP is faster than the Transmission Control Protocol (TCP).CUDP application examples include DNS and VoIP.DUDP is an application layer protocol.EUDP uses a best effort delivery approach.
考题
多选题Which two characteristitcs describe the UDP protocol?()Alimited error checkingBdefined timersCno recovery mechanismsDthree-way handshake
考题
多选题Which two characteristics describe the UDP protocol?()Alimited error checkingBdefined timersCno recovery mechanismsDthree-way handshake
热门标签
最新试卷