LSPs are bidirectional.
LSPs are unidirectional.
LSPs can be signaled by CAC.
LSPs can be configured explicitly.
LSPs can be configured dynamically.
第1题:
Which two statements about MPLS label-switched paths (LSPs) are true? ()
第2题:
Each port that is configured to use LACP has an LACP port priority. Which statements are true about LACP port priority? ()
第3题:
Which two statements are true about the configuration of voice VLANs?()
第4题:
Which two statements regarding external authentication servers for firewall userauthentication are true?()
第5题:
WLSE supports centralized configuration.
WLSE supports distributed configuration.
WLSE can pick up statistics on a device even if the device is not properly configured.
WLSE can be used to upgrade the firmware on APs and bridges.
WLSE monitors device fault and performance conditions but cannot report any policy misconfigurations
第6题:
Static secure MAC addresses can be configured in conjunction with voice VLANs.
PortFast is automatically enabled when voice VLANs are configured.
PortFast must be manually configured when voice VLANs are configured.
Voice VLANs are typically configured on uplink ports.
Voice VLANs are typically configured on access ports.
第7题:
It can be configured to block Java traffic.
It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.
It can only examine network layer and transport layer information.
It can only examine transport layer and application layer information.
The inspection rules can be used to set timeout values for specified protocols.
The ip inspect cbac-name command must be configured in global configuration mode.
第8题:
Export policies can evaluate only active routes
Export policies can evaluate all routes
Export policies can be applied to the forwarding table
Export policies can be applied directly to interfaces
第9题:
Online redo log files can be backed up.
Archived redo log files are backed up.
Only used data blocks can be backed up as backup sets.
Only consistent database backups can be performed.
RMAN backup can be taken only if the database is configured in ARCHIVELOG mode.
第10题:
Up to three external authentication server types can be used simultaneously.
Only one external authentication server type can be used simultaneously.
If the local password database is not configured in the authentication order, and the configured authentication server bypassed.
If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.
第11题:
LSPs are bidirectional.
LSPs are unidirectional.
LSPs can be signaled by CAC.
LSPs can be configured explicitly.
LSPs can be configured dynamically.
第12题:
Port priority value can be configured between 1 and 65535.
A higher port priority value means a higher priority of LACP.
Port priority can be configured so that specific links can be chosen as active links rather than the hot standby links within the port channel.
LACP uses the port priority with the port number to form the port identifier.
LACP Port priority default value should always be changed
第13题:
Which two statements about the Adaptive Services PIC are true? ()
第14题:
Private VLANS can be configured as which three of these port types?()
第15题:
Which three statements are true about Cisco IOS Firewall?()
第16题:
Which two statements are true about the WebLogic Server domains ? ()
第17题:
The Adaptive Services PIC supports the Layer 3 service package by default.
The Adaptive Services PIC is required when using the secure shell to access an M-series router.
The Adaptive Services PIC can be configured for the Layer 2 and Layer 3 service packages simultaneously.
The Adaptive Services PIC can be configured for either the Layer 2 or the Layer 3 service package but not both at the same time.
第18题:
Export polices can evaluate only active routes
Export polices can evaluate all routes
Export polices can be applied to the forwarding table
Export polices can be applied to interfaces
第19题:
TE tunnels that are configured with the FRR option cannot be used as backup tunnels.
TE tunnels that are configured with the FRR option can be used as backup tunnels.
The backup tunnel that is used to protect a physical interface must have a valid IP address configured.
Interfaces must use MPLS global label allocation.
The source IP address of use backup tunnel and the merge point (MP) should not be reachable.
第20题:
LSPs are bidirectional.
LSPs are unidirectional.
LSPs must follow the IGP's shortest path.
LSPs can follow paths other than the IGP's shortest path.
第21题:
Port security can be configured for ports supporting VoIP.
With port security configured, four MAC addresses are allowed by default.
The network administrator must manually enter the MAC address for each device in order for the switch to allow connectivity.
Withsecurity configured, only one MAC addresses is allowed by default.
Port security cannot be configured for ports supporting VoIP.
第22题:
Application Programmers need to refer to domains in their Oracle Web`logic Server programming Interface
domains can be used to separate development, test, and production application, administration and operational responsibility, and organizational or business division
one can share a configured resource or subsystem between domains
the concept of multiple domains is supported
第23题:
SLA sender target can be an IP host
SLA sender sends a probe packet and a response probe packet
SLA sender sends a probe packet
SLA sender target must be a router
SLA sender target can be an IP SLA responder
第24题:
isolated
protected
private
associated
promiscuous
munity