Because data does not need to arrive intact, so data transfer rates can be variable
Because lost voice-data packets must be retransmitted
Because voice data packets should arrive quickly and sequentially, and with no lost data
Because voice data packets must follow a single dedicated path through the network
第1题:
Which two statements are true about Voice over IP (VoIP) packet delivery in a digital infrastructure? ()
第2题:
VOIP has been implemented at the main office of the Company network. Which two statements are true about voice packets in a LAN?()
第3题:
Which three practices are important to the implementation of a DiffServ QoS architecture?()
第4题:
What are two major sources of delay that can be managed by QoS in voice-enabled networks?()
第5题:
Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().
第6题:
A data file become corrupted in your database due to bad sectors on the disk. Because of corruption, you lost all the important tables in that data file. Which method would you use for recovery?()
第7题:
Because data does not need to arrive intact, so data transfer rates can be variable
Because lost voice-data packets must be retransmitted
Because voice data packets should arrive quickly and sequentially, and with no lost data
Because voice data packets must follow a single dedicated path through the network
第8题:
the number of packets that are discarded because they exceed the maximum packet size of the medium
errors created when the CRC generated by the originating LAN station or far-end device does not match the checksum calculated from the data received.
the number of packets that are discarded because they are smaller than the minimum packet size of the medium
the number of received packets that were ignored by the interface because the interface hardware ran low on internal buffers
the number of times that the interface requested another interface within the router to slow down
第9题:
Flash back all the tables in the data file, one by one.
Restore the data file to a new location and perform a media recovery.
Flash back the database, there is no need to restore the data file.
Restore the data file from the most recent backup and flash the database.
第10题:
Physically the voice network and the data network are separate
The voice traffic will normally be on a different IP subnet than will the data traffic
End user intervention is necessary to place the phone into the proper VLAN
The same security policy should be implemented for both voice and data traffic
The data VLAN must be configured as the native VLAN
第11题:
flash back all the tables in the data file, one by one
restore the data file to a new location and perform a media recovery
flash back the database; there is no need to restore the data file
restore the data file from the most recent backup and flash back the database
第12题:
CPU,because the database replication process requires a considerable amount of CPU time
Memory,because the buffer cache requires a large amount of memory to maintain the data in system memory
Disk,because it is important to configure a sufficient number of disks to match the CPU processing power
Network,because the data returned to the client from the server can be a large subset of the total database
第13题:
A data file became corrupted in your database due to bad sectors on the disk. Because of corruption, you lost all the important tables in that data file. Which method would you use for recovery?()
第14题:
When troubleshooting a network, the output of the command show interfaces indicates a large number of runts. What is a runt?()
第15题:
Why is QoS important in a converged network?()
第16题:
What ensures that voice packets are given priority throughout the network so that conversations arrive intact?()
第17题:
In your production database, users report that they are unable to generate reports on an important table because it does not contain any data. While investigating the reason, you realize that another user executed the TRUNCATE TABLE command, which accidentally caused the data to be lost. Now you want to recover the lost data of the table without affecting objects in other schemas. Which method must you use to recover the lost data?()
第18题:
The user SCOTT executes the following command successfully to increase the salary values in one of his sessions: SQL> UPDATE emp SET sal=sal*1.15 WHERE deptno=20; Before SCOTT ends the transaction, user HR who has the privileges on EMP table executes a query to fetch the salary details but finds the old salary values instead of the increased values. Why does HR still see the old data?()
第19题:
Because services are allocated throughout the network before the transmission of data begins, traffic classes can be guaranteed QoS services.
Traffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic classes.
Traffic classes are marked with Layer 3 markings to allow them to traverse different network types without loss of QoS information.
Traffic classes allow networks to provide proper QoS treatment of packets without applications having to request services.
Based upon the network capabilities, QoS markings are placed on packets as needed throughout the network to allow for proper QoS treatment of packets.
QoS markings are placed on packets as close to the network edge as possible to allow distribution and core devices to determine QoS actions as quickly as possible.
第20题:
Because voice data packets must follow a single dedicated path through the network
Because voice data packets should arrive quickly and sequentially, and with no lost data
Because lost voice-data packets must be retransmitted
Because data does not need to arrive intact, so data transfer rates can be variable
第21题:
Complete Recovery with online redo log
Complete Recovery with archived redo log
Tablespace Point-in-Time Recovery (TSPITR)
Incomplete Recovery with system change number (SCN)
第22题:
requires access lists to identify the voice traffic
can allow traffic from a device without 802.1X authentication, by MAC address
can allow traffic from Cisco IP phones by listening to their CDP advertisements
allows all packets marked with a ToS of 5 to bypass authentication
allows all IP voice packets to bypass authentication via stateful inspection
第23题:
Complete Recovery with online redo log
Complete Recovery with archived redo log
Tablespace Point-in-Time Recovery (TSPITR)
Incomplete Recovery with system change number (SCN)
第24题:
QoS
Centrex
Packet encryption
Intelligent call routing