网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which specification provides recommendations on the use of encodings to maximize interoperability?()
A
SAAJ V1.2
B
JAX-RPC V1.0
C
WS-Coordination
D
WS-I Basic Profile (BP) V1.1
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which specification provides recommendations on the use of encodings to maximize interoperability?()A SAAJ V1.2B JAX-RPC V1.0C WS-CoordinationD WS-I Basic Profile (BP) V1.1” 相关考题
考题
The _____ specification delineates specific end use capabilities which can be tested in the acceptance procedure.A performanceB functionalC technicalD base lineE operational
考题
85 The _____ specification delineates specific end use capabilities which can be tested in the acceptance procedure.A. performanceB. functionalC. technicalD. base lineE. operational
考题
(b) Briefly describe the way in which a ‘person specification’ differs from a ‘job description’. (3 marks)
考题
Which of these recommended designs provides the highest availability?()
A. map the Layer 2 VLAN number to the Layer 3 subnetB. control route propagation to edge switches using distribute listsC. use a Layer 2 distribution interconnection link with HSRP or GLBPD. use a Layer 3 distribution interconnection link with HSRP or GLBPE. use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP
考题
Which of these recommendations is most appropriate for the core layer in the Cisco Campus Architecture?()A、 Utilize Layer 3 switchingB、 Utilize software accelerated servicesC、 Aggregate end users and support a feature-rich environmentD、 Perform packet manipulation and filtering at the core layerE、 Use redundant point to-point Layer 2 interconnections when where is a link or node failure.
考题
Which of these recommended designs provides the highest availability?()A、map the Layer 2 VLAN number to the Layer 3 subnetB、control route propagation to edge switches using distribute listsC、use a Layer 2 distribution interconnection link with HSRP or GLBPD、use a Layer 3 distribution interconnection link with HSRP or GLBPE、use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP
考题
Which of the following describes WebSphere Application Servers dynamic caching?()A、Stores and retrieves Java objects from memoryB、Provides disk offloading capabilityC、Cannot use session information to cache servlets or JSPsD、Can be shared but cannot be replicated among servers
考题
Which two statements are true about the Automatic Database Diagnostic Monitor (ADDM)()A、The ADDM requires at least four AWR snapshots for analysis.B、The ADDM runs after each AWR snapshot is collected automatically by MMON.C、The results of the ADDM analysis are stored in the Automatic Workload Repository (AWR).D、The ADDM analysis provides only diagnostic information but does not provide recommendations.E、The ADDM calls other advisors if required, but does not provide recommendations about the advisors.
考题
Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()A、 Never use passive interfaces.B、 Use NSSA areas from the core down.C、 Use totally stub areas to stop type 3 LSAs.D、 Use the lowest Ethernet interface IP address as the router ID.E、 Tune OSPF timers to enable OSPF to achieve quicker convergence
考题
Which two wireless security statements are true?()A、A TACACS+ server is required to implement 802.1x.B、MIC protects against man-in-the-middle and replay attacks.C、The 802.1x standard provides encryption services for wireless clients.D、The AES (symmetric block cipher) is specified in the IEEE 802.11i specification.E、The IEEE 802.11i specification uses RC4 as its encryption mechanism.F、WPA requires TKIP and AES as encryption methods.
考题
Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()A、Never use passive interfaces.B、Use NSSA areas from the core down.C、Use totally stub areas to stop type 3 LSAs.D、Use the lowest Ethernet interface IP address as the router ID.E、Tune OSPF timers to enable OSPF to achieve quicker convergence.
考题
Which is not a reason that Internet Service Providers prefer to use PPP over Ethernet (PPoE)?()A、access control and billing can be done on a per-user, rather than a per-site basisB、supports Link Fragmentation and Interleaving C、provides the ability to connect a network of hosts over a simple bridging access deviceD、provides a consistent means of authenticating users (RADIUS for example)
考题
Which of the following BEST describes the function of a DNS server?()A、Secures network traffic through shared key encryption.B、Provides resolution of host names to IP addresses.C、Provides security for a network through the use of ACLs.D、Dynamically assigns IP addresses for easy client configuration.
考题
You deployed a Java EE Shared Library and want to use it from an application that is also deployed on the same cluster. Which two manifest attributes must be specified at a minimum with corresponding values in the deployment descriptor of the application that requires?()A、Implementation-VersionB、Specification-VersionC、Extension-Name D、Specification-VendorE、Implementation-Vendor
考题
In Oracle 11g, which recommendations does the SQL Access Advisor generate?() A、 partitioning recommendationsB、 statistics collection recommendationsC、 index creation recommendationsD、 materialized view recommendationsE、 materialized view log recommendations
考题
You want to use the SQL Tuning Advisor to generate recommendations for badly written SQL statements in your development environment. Which three sources can you select for the advisor to analyze? ()A、Top SQLB、snapshotsC、SQL Tuning setsD、index access pathE、optimizer statisticsF、materialized view logs
考题
Which specification provides recommendations on the use of encodings to maximize interoperability?()A、 SAAJ V1.2B、 JAX-RPC V1.0C、 WS-CoordinationD、 WS-I Basic Profile (BP) V1.1
考题
单选题Which specification provides recommendations on the use of encodings to maximize interoperability?()A
SAAJ V1.2B
JAX-RPC V1.0C
WS-CoordinationD
WS-I Basic Profile (BP) V1.1
考题
单选题What is TRUE of the history display of a target’s past positions on an ARPA?()A
It provides a graphic display to emphasize which vessel is on a collision courseB
In the true presentation,it provides a quick visual check to determine if a vessel has changed courseC
The display is one of the primary inputs and must be in use when using the trial maneuver capabilityD
It provides a graphic display of a target vessel's relative course,speed,and CPA
考题
单选题A technician is attempting to use a command line prompt to continuously ping a remote server to check availability and reliability of the connection. Which of the following provides the ping command needed to continuously ping the system?()A
ping -aB
ping -fC
ping -rD
ping -t
考题
多选题You want to use the SQL Tuning Advisor to generate recommendations for badly written SQL statements in your development environment. Which three sources can you select for the advisor to analyze? ()ATop SQLBsnapshotsCSQL Tuning setsDindex access pathEoptimizer statisticsFmaterialized view logs
考题
多选题Which two statements are true about the Automatic Database Diagnostic Monitor (ADDM)()AThe ADDM requires at least four AWR snapshots for analysis.BThe ADDM runs after each AWR snapshot is collected automatically by MMON.CThe results of the ADDM analysis are stored in the Automatic Workload Repository (AWR).DThe ADDM analysis provides only diagnostic information but does not provide recommendations.EThe ADDM calls other advisors if required, but does not provide recommendations about the advisors.
考题
单选题A web browser need NOT always perform a complete request for a particular page that it suspects mightNOT have changed. The HTTP specification provides a mechanism for the browser to retrieve only a partialresponse from the web server; this response includes information, such as the Last-Modified date but NOTthe body of the page. Which HTTP method will the browser use to retrieve such a partial response?()A
GETB
ASKC
SENDD
HEADE
TRACE
考题
多选题Which two wireless security statements are true?()AA TACACS+ server is required to implement 802.1x.BMIC protects against man-in-the-middle and replay attacks.CThe 802.1x standard provides encryption services for wireless clients.DThe AES (symmetric block cipher) is specified in the IEEE 802.11i specification.EThe IEEE 802.11i specification uses RC4 as its encryption mechanism.FWPA requires TKIP and AES as encryption methods.
考题
多选题In Oracle 11g, which recommendations does the SQL Access Advisor generate?()Apartitioning recommendationsBstatistics collection recommendationsCindex creation recommendationsDmaterialized view recommendationsEmaterialized view log recommendations
考题
单选题Which of these recommended designs provides the highest availability?()A
map the Layer 2 VLAN number to the Layer 3 subnetB
control route propagation to edge switches using distribute listsC
use a Layer 2 distribution interconnection link with HSRP or GLBPD
use a Layer 3 distribution interconnection link with HSRP or GLBPE
use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP
考题
单选题Which statement most accurately describes the implementation of a SQL Access Advisor recommendation?()A
SQL Access Advisor recommendations are automatically implemented.B
Individual SQL Access Advisor recommendations can be scheduled for implementation.C
All SQL Access Advisor recommendations for a specific task must be implemented at the same time.D
SQL Access Advisor recommendations are automatically scheduled for implementation during the maintenance window.E
None of the above.
热门标签
最新试卷