考题
For which two situations would you use functionality provided by the Resource Manager? ()(Choose two.)
A. setting idle timeout limits on resource plansB. saving storage space by using compressed backup setsC. creating jobs that will run automatically at a scheduled timeD. assigning priorities to jobs to manage access to system resourcesE. creating alerts to perform notification when tablespaces are low on available space resources
考题
Which two statements are true concerning the Resource Manager plans for individual pluggabledatabases (PDB plans) in a multitenant container database (CDB)?()
A. If no PDB plan is enabled for a pluggable database, then all sessions for that PDB are treated to an equal degree of the resource share of that pdb.B. In a PDB plan, subplans may be used with up to eight consumer groups.C. If a PDB plan is enabled for a pluggable database, then resources are allocated to consumer groups across all PDBs in the cdb.D. If no PDB plan is enabled for a pluggable database, then the PDB share in the CDB plan is dynamically calculated.E. If a PDB plan is enabled for a pluggable database, then resources are allocated to consumer groups based on the shares provided to the PDB in the CDB plan and the shares provided to the consumer groups in the PDB plan.
考题
Which two statements are true with regard to policy ordering? ()(Choose two.)
A. The last policy is the default policy, which allows all traffic.B. The order of policies is not important.C. New policies are placed at the end of the policy list.D. The insert command can be used to change the order.
考题
Which two statements are true about precedence values in policy?() (Choose two.)
A. 1 is the default precedence.B. A lower number is preferred.C. A higher number is preferred.D. 100 is the default precedence.
考题
Which two statements are true regarding L2TP? ()(Choose two.)
A. Tunnels are initiated by the LACB. Tunnels are initiated by the LNSC. By default, subscriber authentication occurs on the LNSD. By default, subscriber authentication occurs on the LAC
考题
Which statement concerning GPS is TRUE ________.A.It cannot be used in all parts of the worldB.There are 12 functioning GPS satellites at presentC.It may be suspended without warningD.Two position lines are used to give a 2D fix
考题
Which two statements are true about the protocols that are used for transmitting voice traffic?()A、RTP multiplexing is used to keep multiple phone conversations separateB、RTP provides end-to-end delivery services for voice trafficC、UDP is used to ensure a reliable transmission from sender to receiverD、RTP is used to provide resource reservation for the voice streamE、UDP provides multiplexing
考题
A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()A、are optionalB、are used to protect data beansC、provide coarse-grained access controlD、never specify a relationship
考题
Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC
考题
Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
考题
Which statements are true concerning NAT? ()A、 NAT provides 1 to manyaddress mapping.B、 NAT provides 1 to 1 address mapping.C、 NAT is only useful forTCP/UDP and ICMP traffic.D、 NAT can be used for all IP traffic.
考题
Which two statements are true about the protocols that are used for transmitting voice traffic?()A、RTP multiplexing is used to keep multiple phone conversations separateB、RTP provides end-to-end delivery services for voice traffic.C、UDP is used to ensure a reliable transmission from sender to receiver.D、RTP is used to provide resource reservation for the voice stream.E、UDP provides multiplexing of multiple phone conversations.
考题
Which of the following statements are true?() A、 The equals() method determines if reference values refer to the same object.B、 The == operator determines if the contents and type of two separate objects match.C、 The equals() method returns true only when the contents of two objects match.D、 The class File overrides equals() to return true if the contents and type of two separate objects match.
考题
Which two statements are true regarding L2TP? ()(Choose two.)A、Tunnels are initiated by the LACB、Tunnels are initiated by the LNSC、By default, subscriber authentication occurs on the LNSD、By default, subscriber authentication occurs on the LAC
考题
Which two statements are true with respect to the maintenance window?() .A、 A DBA can enable or disable an individual task in all maintenance windows.B、 A DBA cannot change the duration of the maintenance window after it is created.C、 In case of a long maintenance window,all Automated Maintenance Tasks are restarted every four hours.D、 A DBA can control the percentage of the resource allocated to the Automated Maintenance Tasks in each window
考题
多选题Concerning the figure below, if a =b, which of the following statements must be true? (Indicate all such statements.)Ac=dBl and k are parallelCm and l are perpendicular
考题
多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC
考题
多选题For which two situations would you use functionality provided by the Resource Manager? ()(Choose two.)Asetting idle timeout limits on resource plansBsaving storage space by using compressed backup setsCcreating jobs that will run automatically at a scheduled timeDassigning priorities to jobs to manage access to system resourcesEcreating alerts to perform notification when tablespaces are low on available space resources
考题
多选题Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()AEvery tag must have at least one tag.BA tag can have many tags.CA given tag can apply to only one tag.DA given tag can contain from zero to many tags.EIt is possible to construct a valid tag such that,for a given resource,no user rolescan access that resource.
考题
多选题Which two statements are true about the Oracle Enterprise Manager (OEM) ?()AOEM can do management and monitoring across multiple WLS DomainsBOE is a unified solution for management and monitoring across entire architecture - Web Tier, App Tier DB TierCOEM is focused solely on Oracle solutions, cannot manage 3rd party productsDOEM includes tools to configure the operating system
考题
单选题Which of the following statements is true concerning centrifugal pumps?()A
They are particularly suited for pumping high viscosity fluidsB
They are started with the discharge valve openedC
The flow of liquid is developed by imparting energy due to the rotation of an impellerD
They are always mounted in a horizontal position
考题
单选题Which of the following statements is true concerning any evaporator?()A
High conductivity of the distillate indicates distillate salinity is excessiveB
Increasing the absolute pressure of the shell will increase the distillers capacityC
Mesh separators are used in evaporators to filter the distillateD
Reducing the brine density will reduce the heat lost overboard
考题
多选题For which two situations would you use functionality provided by the Resource Manager?()Asetting idle timeout limits on resource plansBsaving storage space by using compressed backup setsCcreating jobs that will run automatically at a scheduled timeDassigning priorities to jobs to manage access to system resourcesEcreating alerts to perform notification when tablespaces are low on available space resources
考题
多选题Which two statements are true regarding L2TP? ()(Choose two.)ATunnels are initiated by the LACBTunnels are initiated by the LNSCBy default, subscriber authentication occurs on the LNSDBy default, subscriber authentication occurs on the LAC
考题
多选题A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()Aare optionalBare used to protect data beansCprovide coarse-grained access controlDnever specify a relationship
考题
多选题Which two statements are true concerning the Resource Manager plans for individual pluggabledatabases (PDB plans) in a multitenant container database (CDB)?()AIf no PDB plan is enabled for a pluggable database, then all sessions for that PDB are treated to an equal degree of the resource share of that pdb.BIn a PDB plan, subplans may be used with up to eight consumer groups.CIf a PDB plan is enabled for a pluggable database, then resources are allocated to consumer groups across all PDBs in the cdb.DIf no PDB plan is enabled for a pluggable database, then the PDB share in the CDB plan is dynamically calculated.EIf a PDB plan is enabled for a pluggable database, then resources are allocated to consumer groups based on the shares provided to the PDB in the CDB plan and the shares provided to the consumer groups in the PDB plan.
考题
多选题Which of the following statements are true?()AThe equals() method determines if reference values refer to the same object.BThe == operator determines if the contents and type of two separate objects match.CThe equals() method returns true only when the contents of two objects match.DThe class File overrides equals() to return true if the contents and type of two separate objects match.
考题
多选题Which two statements are true about the WebLogic Server domains ? ()AApplication Programmers need to refer to domains in their Oracle Web`logic Server programming InterfaceBdomains can be used to separate development, test, and production application, administration and operational responsibility, and organizational or business divisionCone can share a configured resource or subsystem between domainsDthe concept of multiple domains is supported