VLANs increase the size of collision domains.
VLANs allow logical grouping of users by function.
VLANs simplify switch administration.
VLANs enhance network security.
第1题:
Which two statements are true about L2TP tunnels?() (Choose two.)
第2题:
You need to decide on the best router redundancy protocol to use in the Company network. Which two statements are true about HSRP, VRRP, and GLBP?()
第3题:
You are designing your network to be able to use trunks. As part of this process you are comparing the ISL and 802.1Q encapsulation options. All of these statements about the two encapsulation options are correct except which one?()
第4题:
Which of the following a true statements regarding the use of VLANs to segment anetwork? ()
第5题:
Which two statements about the use of VLANs to segment a network are true? ()
第6题:
Which two statements about bigfile tablespaces are true? ()
第7题:
Which two statements are true regarding transactions in an Oracle database()
第8题:
It may advise the use of online table redefinition for tables in dictionary managed tablespace.
It may advise the use of segment shrink for tables in dictionary managed tablespaces it the no chained rows.
It may advise the use of online table redefinition for tables in locally managed tablespaces
It will detect and advise about chained rows.
It may advise the use of segment shrink for free list managed tables.
第9题:
It also supports PAT.
PAT is not supported.
It allows the use of an address pool.
It requires you to configure an address in the junos-global zone.
第10题:
VLANs increase the size of collision domains.
VLANs allow logical grouping of users by function.
VLANs simplify switch administration.
VLANs enhance network security.
第11题:
SCREEN options offer protection against various attacks
SCREEN options are deployed prior to route and policy processing in first path packet processing
SCREEN options are deployed at the ingress and egress sides of a packet flow
SCREEN options, you must take special care to protect OSPF
第12题:
A single VACL can be shared across two or more VDCs.
Use of VACLs requires no special license to be installed.
VACLs make use of IP or MAC ACLs.
Only options drop and forward are permitted.
第13题:
Which two statements are true about overflow pools?()
第14题:
Which two statements are true about the configuration of voice VLANs?()
第15题:
In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone + Desktop"?()
第16题:
You need to design the VLAN scheme for the Company network. Which two statements are true about best practices in VLAN design?()
第17题:
Which two statements are true about pool-based destination NAT?()
第18题:
Which two statements are true about a bitmap index? ()
第19题:
Multiple transactions can use the same undo segment.
A transaction is assigned an undo segment when it is started.
More than one transaction cannot share the same extent in the undo tablespace.
The transactions use system undo segment to store undo data if all the segments in the undo tablespaceare used.
第20题:
It is recommended for the columns that have unique values.
It can be converted to a B-tree index by using the ALTER INDEX command.
It has a bitmap segment for each distinct value in the key column, containing a string of bits in which each bit represents the presence or absence of a key column value.
Updating the key column locks the whole bitmap segment that contains the bit for the key value to be updated.
第21题:
Routing should occur at the access layer ifvoice VLANs are utilized. Otherwise, routing should occur at the distribution layer.
Routing should always be performed at the distribution layer.
VLANs should be localized to a switch.
VLANs should be localized to a single switch unlessvoice VLANs are being utilized.
Routing should not be performed between VLANs located on separate switches.
第22题:
Voice VLANs are only used when connecting an IP phone and a host to distinct switch ports
Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phones
Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phone
Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration command
Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the port
Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings
第23题:
Devices use DHCP to request their VLAN.
Attached devices are unaware of any VLANs.
Devices are assigned to VLANs based on their MAC addresses.
Devices are in the same VLAN regardless of which port they attach to.
第24题:
They increase the size of collision domains
They allow logical grouping of users by function.
They can enhance network security.
They increase the size of the broadcast domain while decreasing the number of collision domains.
They increase the number of broadcast domains while decreasing the size of the broadcast domains.
They simplify switch administration.