考题
Which three steps are considered part of the initial configuration?()
A.SNMPB.hostnameC.root passwordD.user passwordE.management access interface
考题
Which of the following describes how DB2 9 stores an XML document if the XML Extender is not used?()
A.CLOBB.BLOBC.HierarchicallyD.Rows and columns
考题
Which statement best describes Cisco IOS Zone-Based Policy Firewall?()A、A router interface can belong to multiple zones.B、Policy maps are used to classify traffic into different traffic classes, and class maps are used to assignaction to the traffic classes.C、The pass action works in only one directionD、A zone-pair is bidirectional because it specifies traffic flowing among the interfaces within the zone-pair in both directions.
考题
When implementing OSPFv3, which statement describes the configuration of OSPF areas?()A、In interface configuration mode, the OSPFv3 area ID combination assigns interfaces to OSPFv3 areas.B、In router configuration mode, the network wildcard area ID combination assigns networks to OSPFv3 areas.C、In interface configuration mode, the IPv6 OSPF process area ID combination assigns interfaces to OSPFv3 areas.D、In router configuration mode, the IPv6 OSPF interface area ID combination assigns interfaces to OSPFv3 areas.
考题
Switch R1 has been configured with DTP using the desirable option. Which statement describes Dynamic Trunking Protocol (DTP) desirable mode?()A、 The interface actively attempts to convert the link to a trunk link.B、 The interface is put into permanent trunking mode but prevented from generating DTP frames. C、 The interface is put into permanent trunking mode and negotiates to convert the link into a trunk link.D、 The interface is put into a passive mode, waiting to convert the link to a trunk link. E、 None of the other alternatives apply
考题
Which statement describes the behavior of a security policy?()A、The implicit default security policy permits all traffic.B、Traffic destined to the device itself always requires a security policy.C、Traffic destined to the device’s incoming interface does not require a security policy.D、The factory-default configuration permits all traffic from all interfaces.
考题
Which statement describes the Authentication Proxy feature?()A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.
考题
Which statement about an IPS is true?()A、The IPS is in the traffic path.B、Only one active interface is required.C、Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS.D、When malicious traffic is detected,the IPS will only send an alert to a management station.
考题
Which of the following should be changed to secure access to a WAPs configuration management interface?()A、SSIDB、WPA2C、DHCPD、Password
考题
Which of the following can deploy system plans generated by the IBM System Planning Tool (SPT)?()A、 The Hardware Management Console (HMC) and Integrated Virtualization Manager (IVM).B、 The Hardware Management Console (HMC) and Advanced System Manager Interface (ASMI).C、 Integrated Virtualization Manager (IVM) and Advanced System Manager Interface (ASMI).D、 Integrated Virtualization Manager (IVM) and BladeCenter Advanced Management Module (AMM).
考题
Which WebSphere Commerce catalog management tool replaces symbols in an XML file with the appropriate numeric values for new or existing records in the WebSphere Commerce database?()A、Data CheckerB、DTD GeneratorC、ID ResolverD、Mass LoaderE、XML Transformer
考题
Which of the following interfaces is required to implement Workload Partition Mobility? ()A、 Workload Partitions Manager for AIXB、 Hardware Management Console (HMC) GUIC、 Integrated Virtualization Manager (IVM)D、 Advanced System Management Interface (ASMI)
考题
Which WebSphere Commerce catalog management tool creates an XML file and DTD file from CSV formatted data?()A、DTD GeneratorB、ExtractorC、Mass LoaderD、Text TransformerE、XML Transformer
考题
Which of the following describes how DB2 9 stores an XML document if the XML Extender is not used?()A、CLOBB、BLOBC、HierarchicallyD、Rows and columns
考题
Which three steps are considered part of the initial configuration?()A、SNMPB、hostnameC、root passwordD、user passwordE、management access interface
考题
In Solaris 10, this tool provides an automated and proactive approach to patch management. It provides a graphical user interface as well as a command line interface. Which tool is it? ()A、 smpatchB、 PatchtoolC、 Update managerD、 Patch manager
考题
Which statement describes the effect of the execution of the above PL/SQL block?()A、The plan baselines are verified with the SQL profiles.B、All fixed plan baselines are converted into nonfixed plan baselines.C、All the nonaccepted SQL profiles are accepted into the plan baseline.D、The nonaccepted plans in the SQL Management Base are verified with the existing plan baselines.
考题
单选题Switch R1 has been configured with DTP using the desirable option. Which statement describes Dynamic Trunking Protocol (DTP) desirable mode?()A
The interface actively attempts to convert the link to a trunk link.B
The interface is put into permanent trunking mode but prevented from generating DTP frames. C
The interface is put into permanent trunking mode and negotiates to convert the link into a trunk link.D
The interface is put into a passive mode, waiting to convert the link to a trunk link. E
None of the other alternatives apply
考题
单选题Which statement about an IPS is true?()A
The IPS is in the traffic path.B
Only one active interface is required.C
Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS.D
When malicious traffic is detected,the IPS will only send an alert to a management station.
考题
单选题Which statement describes the purpose of BGP route damping?()A
Avoid interface bandwidth saturation.B
Drop BGP routes when the routing-table becomes full.C
Remove unnecessary route attributes when not in use.D
Limit the effects of a flaping interface on route removal and readvertisement.
考题
单选题Which statement describes the effect of the execution of the above PL/SQL block?()A
The plan baselines are verified with the SQL profiles.B
All fixed plan baselines are converted into nonfixed plan baselines.C
All the nonaccepted SQL profiles are accepted into the plan baseline.D
The nonaccepted plans in the SQL Management Base are verified with the existing plan baselines.
考题
单选题Which WebSphere Commerce catalog management tool creates an XML file and DTD file from CSV formatted data?()A
DTD GeneratorB
ExtractorC
Mass LoaderD
Text TransformerE
XML Transformer
考题
单选题A user issues a SELECT command against the Oracle database. Which of the following choices describes a step that Oracle will execute in support of this statement?()A
Acquire locks on table queried B
Generate redo for statement C
Fetch data from disk into memory D
Write changes to disk
考题
单选题In Solaris 10, this tool provides an automated and proactive approach to patch management. It provides a graphical user interface as well as a command line interface. Which tool is it? ()A
smpatchB
PatchtoolC
Update managerD
Patch manager
考题
单选题Which of the following can deploy system plans generated by the IBM System Planning Tool (SPT)?()A
The Hardware Management Console (HMC) and Integrated Virtualization Manager (IVM).B
The Hardware Management Console (HMC) and Advanced System Manager Interface (ASMI).C
Integrated Virtualization Manager (IVM) and Advanced System Manager Interface (ASMI).D
Integrated Virtualization Manager (IVM) and BladeCenter Advanced Management Module (AMM).
考题
单选题Which statement describes the behavior of a security policy?()A
The implicit default security policy permits all traffic.B
Traffic destined to the device itself always requires a security policy.C
Traffic destined to the device’s incoming interface does not require a security policy.D
The factory-default configuration permits all traffic from all interfaces.
考题
单选题Which of the following interfaces is required to implement Workload Partition Mobility? ()A
Workload Partitions Manager for AIXB
Hardware Management Console (HMC) GUIC
Integrated Virtualization Manager (IVM)D
Advanced System Management Interface (ASMI)