网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which statement about data center access layer design modes is correct?()

  • A、The access layer is the first oversubscription point in a data center design.
  • B、When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.
  • C、When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.
  • D、When using a Layer 3 design,stateful services requiring Layer 2 connectivity are provisioned from the aggregation layer.
  • E、The data center access layer provides the physical-level connections to the server resources and only operates at Layer 3.

参考答案

更多 “Which statement about data center access layer design modes is correct?()A、The access layer is the first oversubscription point in a data center design.B、When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.C、When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.D、When using a Layer 3 design,stateful services requiring Layer 2 connectivity are provisioned from the aggregation layer.E、The data center access layer provides the physical-level connections to the server resources and only operates at Layer 3.” 相关考题
考题 Which two statements about the SQL Management Base (SMB) are true?() A. It contains only SQL profiles generated by SQL Tuning Advisor.B. It stores plans generated by the optimizer using a stored outline.C. It is part of the data dictionary and stored in the SYSAUX tablespace.D. It is part of the data dictionary and stored in the SYSTEM tablespace.E. It contains the statement log, the plan history, plan baselines, and SQL profiles.

考题 Examine the following command that is executed for the TRANSPORT table in the SH schema:Which statement describes the significance of this command?() A. It collects statistics into the pending area in the data dictionaryB. It creates a virtual hidden column in the CUSTOMERS_OBE tableC. It collects statistics with AUTO_SAMPLE_SIZE for ESTIMATE_PERCENTD. It creates a histogram to hold skewed information about the data in the columns

考题 Which statement is true about the frequency of OSPF LSA transmissions?() A.AB.BC.CD.D

考题 Which statement about the S-Series native FTP proxy is not true?() A、 both active and passive modes FTP are supportedB、 by default the FTP proxy uses port 8021C、 access polices may apply to native FTP trafficD、 data loss prevention policies may apply to native FTP trafficE、 authentication is supported in transparent mode

考题 Which statement is true about a worm attack?()A、Human interaction is required to facilitate the spread.B、The worm executes arbitrary code and installs copies of itself in the memory of the infected computer.C、Extremely large volumes of requests are sent over a network or over the Internet.D、Data or commands are injected into an existing stream of data. That stream is passed between a client and server application.

考题 Which statement is true about IBGP routers? ()A、They must be fully meshedB、They can be in a different ASC、They must be directly connected

考题 Which statement is true about voice VLANs? ()A、When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.B、The voice VLAN feature is enabled by default.C、The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.D、The default CoS value is 1 for incoming voice and data traffic.

考题 Which two statements are true about terms in a routing policy?()A、A then statement is mandatory in a termB、If a term does not contain a from statement, all routers matchC、If a term does not contain a from statement, the Junos OS will not commitD、A then statement is not mandatory in a term

考题 Which three are true?()A、A MERGE statement is used to merge the data of one table with data from another.B、A MERGE statement replaces the data of one table with that of another.C、A MERGE statement can be used to insert new rows into a table.D、A MERGE statement can be used to update existing rows in a table.

考题 Which statement is true about the loss of system/x7fcritical data files in ARCHIVELOG mode?()A、The data files can be recovered till the last committed transaction.B、The data files can be recovered without shutting down the database.C、The data file is taken offline automatically; the database remains open.D、The data files can be recovered to the time of the most recent backup.

考题 Which statement is TRUE about the CacheFactory class ?()A、 it is a topology agnostic way to access NamedCachesB、 it provides mechanisms to manage underlying remote data sourcesC、 both A and B are TRUED、Neither A nor B are TRUE

考题 Which statement is true about the UNDO_RETENTION parameter when retention guarantee is notenabled()A、It is the time period after which the undo data becomes obsolete.B、It is the time period after which the committed undo data would be transferred to a temporarytablespace.C、It is the minimum time period up to which the committed undo data would be retained if free undo spaceis available.D、It is the time period after which the undo data is transferred to the Flash Recovery Area to provide readconsistency.

考题 Which statement is true about loading data using the conventional path of SQL*Loader()A、Redo is not generated while performing conventional path loads.B、Only PRIMARY KEY, UNIQUE KEY, and NOT NULL constraints are checked.C、No exclusive locks are acquired when the conventional path loads are performed.D、Instead of performing transactions, SQL*Loader directly writes data blocks to the data files.E、INSERT triggers are disabled before the conventional path load and reenabled at the end of the load

考题 Which statement is true about the loss of system-critical data files in ARCHIVELOG mode?()A、The data files can be recovered till the last committed transaction.B、The data files can be recovered without shutting down the database.C、The data file is taken offline automatically; the database remains open.D、The data files can be recovered to the time of the most recent backup.

考题 Which two statements about subqueries are true? ()A、A single row subquery can retrieve data from only one table.B、A SQL query statement cannot display data from table B that is referred to in its subquery, unless table B is included in the main query's FROM clause.C、A SQL query statement can display data from table B that is referred to in its subquery, without including B in its own FROM clause.D、A single row subquery can retrieve data from more than one table.E、A single row subquery cannot be used in a condition where the LIKE operator is used for comparison.F、A multiple-row subquery cannot be used in an INSERT statement to insert multiple rows at a time.

考题 多选题Which two statements about the SQL Management Base (SMB) are true?()AIt contains only SQL profiles generated by SQL Tuning Advisor.BIt stores plans generated by the optimizer using a stored outline.CIt is part of the data dictionary and stored in the SYSAUX tablespace.DIt is part of the data dictionary and stored in the SYSTEM tablespace.EIt contains the statement log, the plan history, plan baselines, and SQL profiles.

考题 单选题Your database is running in ARCHIVELOG mode. You are performing a user-managed backup of the DATA1 tablespace.  You place the DATA1 tablespace in backup mode by issuing the following statement:   ALTER TABLESPACE data1 BEGIN BACKUP;   While you are performing the backup, an error occurs that causes the instance to terminate abnormally. Which statement about the DATA1 tablespace is true?()A  The DATA1 tablespace is automatically taken out of backup mode when the instance aborts.B  If you restart the database,the DATA1 tablespace will be automatically taken out of backup mode  when the database is opened.C  If you restart the database,the DATA1 tablespace will be automatically taken out of backup mode  when the database is mounted.D  If you restart the database,the database will not be opened.

考题 单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A  Physically the voice network and the data network are separate.B  The voice traffic will normally be on a different IP subnet than will the data traffic.C  End user intervention is necessary to place the phone into the proper VLAN.D  The same security policy should be implemented for both voice and data traffic.E  The data VLAN must be configured as the native VLAN.

考题 单选题Which statement is true about the loss of system-critical data files in ARCHIVELOG mode?()A The data files can be recovered till the last committed transaction.B The data files can be recovered without shutting down the database.C The data file is taken offline automatically; the database remains open.D The data files can be recovered to the time of the most recent backup.

考题 单选题Which statement is true about the loss of system/x7fcritical data files in ARCHIVELOG mode?()A The data files can be recovered till the last committed transaction.B The data files can be recovered without shutting down the database.C The data file is taken offline automatically; the database remains open.D The data files can be recovered to the time of the most recent backup.

考题 单选题Which statement is TRUE about the CacheFactory class ?()A  it is a topology agnostic way to access NamedCachesB  it provides mechanisms to manage underlying remote data sourcesC  both A and B are TRUED Neither A nor B are TRUE

考题 多选题Which two statements are true about terms in a routing policy?()AA then statement is mandatory in a termBIf a term does not contain a from statement, all routers matchCIf a term does not contain a from statement, the Junos OS will not commitDA then statement is not mandatory in a term

考题 单选题Which statement is true about the UNDO_RETENTION parameter when retention guarantee is notenabled()A It is the time period after which the undo data becomes obsolete.B It is the time period after which the committed undo data would be transferred to a temporarytablespace.C It is the minimum time period up to which the committed undo data would be retained if free undo spaceis available.D It is the time period after which the undo data is transferred to the Flash Recovery Area to provide readconsistency.

考题 单选题Which statement is true about the UNDO_RETENTION parameter when retention guarantee is not enabled()A It is the time period after which the undo data becomes obsolete.B It is the time period after which the committed undo data would be transferred to a temporary tablespace.C It is the minimum time period up to which the committed undo data would be retained if free undo space isavailable.D It is the time period after which the undo data is transferred to the Flash Recovery Area to provide readconsistency.

考题 多选题Which three are true?()AA MERGE statement is used to merge the data of one table with data from another.BA MERGE statement replaces the data of one table with that of another.CA MERGE statement can be used to insert new rows into a table.DA MERGE statement can be used to update existing rows in a table.

考题 单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A Physically the voice network and the data network are separateB The voice traffic will normally be on a different IP subnet than will the data trafficC End user intervention is necessary to place the phone into the proper VLAND The same security policy should be implemented for both voice and data trafficE The data VLAN must be configured as the native VLAN

考题 单选题Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()A  The data traffic between the access point and controller is not encrypted.B  The data traffic is encapsulated with LWAPP.C  The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.D  The data traffic is encrypted with AES.E  All of the above

考题 单选题Which statement is true about voice VLANs? ()A When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.B The voice VLAN feature is enabled by default.C The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.D The default CoS value is 1 for incoming voice and data traffic.