网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which two statements about zoning are correct? ()
A. Zoning increases security.
B. DNS queries are used for software zoning.
C. Software zoning is more secure than hardware zoning.
D. When using zones and VSANs together, the zone is created first.
E. Zoning requires that VSANs be established before it becomes operational.
参考答案
更多 “ Which two statements about zoning are correct? () A. Zoning increases security.B. DNS queries are used for software zoning.C. Software zoning is more secure than hardware zoning.D. When using zones and VSANs together, the zone is created first.E. Zoning requires that VSANs be established before it becomes operational. ” 相关考题
考题
●Which of the following statements about object oriented database is not correct? (72) .(72) A.Each object has a unique object identify in the systemB.Encapsulation and inheritance are two important features of object oriented databaseC.A subclass can inherit the attributes and methods of all its superclassesD.A supereloss includes the attributes and methods at all subclasses
考题
Which of the following statements about object oriented databse is not correct?A. Each object has a unique object identity in the system.B.Encapsulation and inheritance are two important features of object oriented databasE.C.A subclass can inherit the attributes and methods of all its superclasses.D.A subclass includes the attributes and methods of all its subclasses.
考题
15 Which of the following statements about intangible assets are correct?1 If certain criteria are met, research expenditure must be recognised as an intangible asset.2 Goodwill may not be revalued upwards.3 Internally generated goodwill should not be capitalised.A 2 and 3 onlyB 1 and 3 onlyC 1 and 2 onlyD All three statements are correct
考题
19 Which of the following statements about intangible assets in company financial statements are correct accordingto international accounting standards?1 Internally generated goodwill should not be capitalised.2 Purchased goodwill should normally be amortised through the income statement.3 Development expenditure must be capitalised if certain conditions are met.A 1 and 3 onlyB 1 and 2 onlyC 2 and 3 onlyD All three statements are correct
考题
Which of the following statements about ORACLE is (are) correct?Ⅰ.ORACLE follows SQL standardⅡ.ORACLE database defines two logical types: table and viewA.ⅠonlyB.Ⅱ onlyC.Ⅰ and ⅡD.none of the above
考题
Which two statements are true about precedence values in policy?() (Choose two.)
A. 1 is the default precedence.B. A lower number is preferred.C. A higher number is preferred.D. 100 is the default precedence.
考题
Which three statements are correct about Rate Limiters? ()(Choose three.)
A. one-rate rate limitersB. two-rate rate limitersC. two-rate rate limiters is the defaultD. one-rate rate limiters is the defaultE. there is no default it must be configured
考题
Refer to the exhibit. Which two statements about the topologies shown are correct?()
A. Design 1 is a looped triangle design.B. Design 2 is a looped triangle design.C. Design 2 achieves quick convergence using RSTP.D. Both designs supportstateful services at the aggregation layer.E. Design 2 is the most widely deployed in enterprise data centers.
考题
In HDLC Protocol, when Supervisory Frame's type code is '00'.About the following statements, which is correct.A.Receive ReadyB.Receive not ReadyC.RejectD.Selective Reject
考题
Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC
考题
Which two statements about Junos software packet handling are correct?()(Choose two.)A、The Junos OS applies service ALGs only for the first packet of a flow.B、The Junos OS uses fast-path processing only for the first packet of a flow.C、The Junos OS performs policy lookup only for the first packet of a flow.D、The Junos OS applies SCREEN options for both first and consecutive packets of a flow.
考题
Which two statements about layer 3 access designs are correct?()A、 IP address space is difficult to manage.B、 Broadcast and fault domains arc increasedC、 Convergence time is fractionally slower than STPD、 Limits on clustering and NIC teaming are removedE、 Fast uplink convergence is supported tor failover and fallback
考题
Which two statements about an interface configured with the asr-group command are correct?()A、The FWSM supports up to 16 asymmetric routing groups.B、If a matching packet is not found, the packet is dropped.C、Asymetric routing of return traffic is enabled.D、If a matching packet is found, the Layer 3 header is rewritten.E、If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.
考题
Which two statements about the configuration of the switch interface are correct (Choose two)()。A、The switchport belongs only to VLAN 2B、Interface fa0/0 will be in both VLAN 1 (by default) and VLAN 2C、The exhibit shows interface fa0/0 to be dynamically mapped to VLAN 2D、A network host can be connected to this interface
考题
Which two statements about Cisco Security Management Suite are correct?()A、It should be implemented in a management VLAN.B、Its connection to managed devices should be over a data VLAN.C、It is made up of Cisco Security MARS and Clean Access software.D、It should be deployed as close to the edge of the network as possible.E、It delivers policy administration and enforcement for the Cisco Self-Defending Network.
考题
Which two statements about zoning are correct? ()A、Zoning increases security.B、DNS queries are used for software zoning.C、Software zoning is more secure than hardware zoning.D、When using zones and VSANs together, the zone is created first.E、Zoning requires that VSANs be established before it becomes operational.
考题
You are the Cisco Network Designer in Cisco.com. Which two statements about Layer 3 access designs are correct?()A、Convergence time is fractionally slower than STP.B、Broadcast and fault domains are increased.C、IP address space is difficult to manage.D、Fast uplink convergence is supported for failover and fallback.
考题
Which two statements about Network Attached Storage are correct?()A、Data is accessed using NFS or CIFS.B、Data is accessed at the block level.C、NAS is referred to as captive storage.D、Storage devices can be shared between users.E、A NAS implementation is not as fast as a DAS implementation.
考题
Which three statements are correct about Rate Limiters? ()(Choose three.)A、one-rate rate limitersB、two-rate rate limitersC、two-rate rate limiters is the defaultD、one-rate rate limiters is the defaultE、there is no default it must be configured
考题
Which two statements are true about precedence values in policy?() (Choose two.)A、1 is the default precedence.B、A lower number is preferred.C、A higher number is preferred.D、100 is the default precedence.
考题
多选题Which two statements about layer 3 access designs are correct?()AIP address space is difficult to manage.BBroadcast and fault domains arc increasedCConvergence time is fractionally slower than STPDLimits on clustering and NIC teaming are removedEFast uplink convergence is supported tor failover and fallback
考题
多选题Which two statements about Junos software packet handling are correct?()(Choose two.)AThe Junos OS applies service ALGs only for the first packet of a flow.BThe Junos OS uses fast-path processing only for the first packet of a flow.CThe Junos OS performs policy lookup only for the first packet of a flow.DThe Junos OS applies SCREEN options for both first and consecutive packets of a flow.
考题
多选题Which two statements regarding the FLASHBACK_TRANSACTION_QUERY view are correct?()AYou can find information about only active transactions from the viewBYou can find information about read only transactions from the viewCYou require the SELECT ANY TRANSACTION system privilege to access the viewDYou can find information about both active and committed transactions from the viewEYou require the SELECT ON FLASHBACK_TRANSACTION_QUERY object privilege to access the view
考题
多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC
考题
多选题Which two statements about zoning are correct? ()AZoning increases security.BDNS queries are used for software zoning.CSoftware zoning is more secure than hardware zoning.DWhen using zones and VSANs together, the zone is created first.EZoning requires that VSANs be established before it becomes operational.
考题
多选题Which two statements about the use of SCREEN options are correct? ()(Choose two.)ASCREEN options offer protection against various attacksBSCREEN options are deployed prior to route and policy processing in first path packet processingCSCREEN options are deployed at the ingress and egress sides of a packet flowDSCREEN options, you must take special care to protect OSPF
考题
多选题Which two statements about the configuration of the switch interface are correct (Choose two)()。AThe switchport belongs only to VLAN 2BInterface fa0/0 will be in both VLAN 1 (by default) and VLAN 2CThe exhibit shows interface fa0/0 to be dynamically mapped to VLAN 2DA network host can be connected to this interface
热门标签
最新试卷