niusouti.com
更多“Which are the two options to which a menu can be assigned?() (Choose two.)A、menuB、functionsC、data groupD、responsibilityE、functional group”相关问题
  • 第1题:

    Which two statements are true regarding redundancy groups? ()(Choose two.)

    A. When priority settings are equal and the members participating in a cluster are initialized at the same time, the primary assigned to node 0.

    B. The preempt option determines the primary and secondary roles for redundancy group 0 during a failure and recovery

    C. Redundancy group 0 manages the control plane failover between the nodes of a cluster.

    D. The primary role can be shared for redundancy group 0 when the active-active option is enabled.


    参考答案:A, C

  • 第2题:

    Which two statistical data types are available on the statistics page of the WebUI? ()(Choose two.)

    A. cache statistics

    B. client browser type

    C. server response time

    D. HTTP response codes


    参考答案:B, D

  • 第3题:

    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

    • A、A client group is a list of clients associated with a group.
    • B、A client group is a list of groups associated with a client.
    • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
    • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

    正确答案:B,C

  • 第4题:

    Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies? (Choose two.)()

    • A、copier
    • B、microwave oven
    • C、toaster
    • D、cordless phone
    • E、IP phone
    • F、AM radio

    正确答案:B,D

  • 第5题:

    Which two content-filtering features does FTP support?() (Choose two.)

    • A、block extension list
    • B、block MIME type
    • C、protocol command list
    • D、notifications-options

    正确答案:A,C

  • 第6题:

    Which two statements about the use of SCREEN options are correct? ()(Choose two.)

    • A、SCREEN options offer protection against various attacks
    • B、SCREEN options are deployed prior to route and policy processing in first path packet processing
    • C、SCREEN options are deployed at the ingress and egress sides of a packet flow
    • D、SCREEN options, you must take special care to protect OSPF

    正确答案:A,B

  • 第7题:

    Which two functions of the Junos OS are handled by the data plane? ()(Choose two.)

    • A、NAT
    • B、OSPF
    • C、SNMP
    • D、SCREEN options

    正确答案:A,D

  • 第8题:

    For which two database objects can the VERSIONS clause of the Flashback Versions Query be used?()(Choose two.)

    • A、views
    • B、fixed tables
    • C、heap tables
    • D、external tables
    • E、temporary tables
    • F、index-organized tables (IOT)

    正确答案:C,F

  • 第9题:

    Identify two situations in which you can use Data Recovery Advisor for recovery. ()(Choose two.)

    • A、The user has dropped an important table that needs to be recovered.
    • B、The database files are corrupted when the database is open.
    • C、You are not able to start up the database instance because the required database files are missing.
    • D、The archived log files are missing for which backup is not available.

    正确答案:B,C

  • 第10题:

    多选题
    Which are the two options to which a menu can be assigned?() (Choose two.)
    A

    menu

    B

    functions

    C

    data group

    D

    responsibility

    E

    functional group


    正确答案: B,D
    解析: 暂无解析

  • 第11题:

    多选题
    Identify two situations in which you can use Data Recovery Advisor for recovery. ()(Choose two.)
    A

    The user has dropped an important table that needs to be recovered.

    B

    The database files are corrupted when the database is open.

    C

    You are not able to start up the database instance because the required database files are missing.

    D

    The archived log files are missing for which backup is not available.


    正确答案: B,C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies (Choose two.)()。
    A

    copier

    B

    microwave oven

    C

    toaster

    D

    cordless phone

    E

    IP phone

    F

    AM radio


    正确答案: D,B
    解析: 暂无解析

  • 第13题:

    Which two functions of the Junos OS are handled by the data plane? ()(Choose two.)

    A. NAT

    B. OSPF

    C. SNMP

    D. SCREEN options


    参考答案:A, D

  • 第14题:

    Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies (Choose two.)()。

    A.copier

    B.microwave oven

    C.toaster

    D.cordless phone

    E.IP phone

    F.AM radio


    参考答案:B, D

  • 第15题:

    Which two of these data encryption AIM modes are found on the 3800 family of Cisco ISR Routers? (Choose two.)()

    • A、 BPII 
    • B、 SPII-Plus 
    • C、 FPII 
    • D、 EPII-Plus 
    • E、 HPII 
    • F、 HPII-PIus

    正确答案:D,F

  • 第16题:

    Which two types of nodes are included in an MPLS explicit route? ()(Choose two.)

    • A、peer
    • B、strict
    • C、loose
    • D、system

    正确答案:B,C

  • 第17题:

    Which two statistical data types are available on the statistics page of the WebUI? ()(Choose two.)

    • A、cache statistics
    • B、client browser type
    • C、server response time
    • D、HTTP response codes

    正确答案:B,D

  • 第18题:

    The Cisco SDM can configure most, but not all, routing protocols. Which two of these routing protocols can be configured using SDM? (Choose two.)()

    • A、 BGP
    • B、 IGRP
    • C、 ISIS
    • D、 OSPF
    • E、 EIGRP

    正确答案:D,E

  • 第19题:

    Which two statements regarding symmetric key encryption are true?() (Choose two.)

    • A、The same key is used for encryption and decryption.
    • B、It is commonly used to create digital certificate signatures.
    • C、It uses two keys: one for encryption and a different key for decryption.
    • D、An attacker can decrypt data if the attacker captures the key used for encryption.

    正确答案:A,D

  • 第20题:

    Which two are the prerequisites to enable Flashback Data Archive?() (Choose two.)

    • A、Database must be running in archivelog mode.
    • B、Automatic undo management must be enabled.
    • C、Undo retention guarantee must be enabled.
    • D、The tablespace on which the Flashback Data Archive is created must be managed with Automatic Segment Space Management (ASSM).

    正确答案:B,D

  • 第21题:

    多选题
    For which two database objects can the VERSIONS clause of the Flashback Versions Query be used?()(Choose two.)
    A

    views

    B

    fixed tables

    C

    heap tables

    D

    external tables

    E

    temporary tables

    F

    index-organized tables (IOT)


    正确答案: F,A
    解析: 暂无解析

  • 第22题:

    多选题
    The Cisco SDM can configure most, but not all, routing protocols. Which two of these routing protocols can be configured using SDM? (Choose two.)()
    A

    BGP

    B

    IGRP

    C

    ISIS

    D

    OSPF

    E

    EIGRP


    正确答案: E,A
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements regarding symmetric key encryption are true?() (Choose two.)
    A

    The same key is used for encryption and decryption.

    B

    It is commonly used to create digital certificate signatures.

    C

    It uses two keys: one for encryption and a different key for decryption.

    D

    An attacker can decrypt data if the attacker captures the key used for encryption.


    正确答案: D,B
    解析: 暂无解析