A. source address
B. options
C. sequence number
D. sources
E. destination port
F. checksum
第1题:
How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()
第2题:
What is the purpose of a zone in JUNOS Software?()
第3题:
Which two statements are true regarding a tablespace()
第4题:
Your network consists of two subnets named Subnet1 and Subnet2. You have a server named Server1 that runs Windows Sever 2003 Service Pack 2 (SP2). Server1 is located on Subnet1. Users from Subnet1 report poor performance when they connect to Server1. Users from Subnet2 report that they are unable to connect to Server1.You monitor both network segments and discover a large number of NetBIOS broadcasts on both network segments.You need to reduce the number of broadcasts on the network. What should you deploy?()
第5题:
Your network consists of a single Active Directory site that includes two network segments. Thenetwork segments connect by using a router that is RFC 1542 compliant. You plan to use Windows Deployment Services (WDS) to deploy Windows Server 2008 R2 servers. All new servers support Pre-Boot Execution Environment (PXE). You need to design a deployment strategy to meet the following requirements: èSupport Windows Server?2008 R2 èDeploy the servers by using WDS in both network segments èMinimize the number of servers used to support WDS What should you include in your design?()
第6题:
关于数据封装的顺序()是正确的。
第7题:
DatA.segments-packets-frames-bits
B.Datpackets-segments-frames-bits
C.Datframes-segments-packets-bits
D.Datsegments-frames-packets-bits
第8题:
They acknowledge receipt of TCP segments.
They guarantee datagram delivery.
They can provide hosts with information about network problems.
They are encapsulated within IP datagrams.
They are encapsulated within UDP datagrams.
第9题:
Disable IP Routing.
Create a static route.
Enable demand-dial routing.
Enable a DHCP Relay Agent.
第10题:
These attacks send multiple FIN segments forcing TCP connection release.
These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.
These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.
These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.
These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.
第11题:
It would return information regarding only the last committed transaction.
It would return only the active transactions in all the undo segments in the database.
It would return only the committed transactions in all the undo segments in the database.
It would return both active and committed transactions in all the undo segments in the database.
It would return information regarding the transactions that began and were committed in the last 30 minutes.
第12题:
It can span multiple databases.
It can consist of multiple data files.
It can contain blocks of different sizes.
It can contain segments of different sizes.
It can contain a part of a nonpartitioned segment.
第13题:
What statements are true regarding ICMP packets?()
第14题:
You executed the following command to create a tablespace called SALES_DATA: SQL> CREATE TABLESPACE sales_data DATAFILE SIZE 100M SEGMENT SPACE MANAGEMENT AUTO; Which two statements are true about the SALES_DATA tablespace()
第15题:
You executed the following query: SELECT operation, undo_sql, table_name FROM flashback_transaction_query; Which statement is correct regarding the query output?()
第16题:
You are configuring services to be discoverable. The services must be discoverable without relying on a central server. Client applications that consume the services are on a network segment that is separate from the network segment that the services are located on.A firewall blocks all TCP ports between the two network segments, but allows other protocols to pass through.You need to ensure that the client applications can discover the services. What should you do?()
第17题:
Your network consists of two subnets named Subnet1 and Subnet2. You have a server named Server1 that runs Windows Sever 2003 Service Pack 2 (SP2). Server1 is located on Subnet1. Users from Subnet1 report poor performance when they connect to Server1. Users from Subnet2 report that they are unable to connect to Server1. You monitor both network segments and discover a large number of NetBIOS broadcasts on both network segments. You need to reduce the number of broadcasts on the network. What should you deploy?()
第18题:
Segment Advisor
SQL Tuning Advisor
SQL Access Advisor
Segment Resource Estimation
Automatic Database Diagnostic Monitor (ADDM)
第19题:
identify the segments that you should shrink
modify the storage parameters for the tablespace
automatically shrink the segments with unused space
check the alerts generated for the tablespace that is running low on space
第20题:
Packet Switching
Access Layer Security
Path Selection.
VLAN Membership Assignment.
Bridging between LAN segments.
Micro-segmentation of Broadcast Domains.
第21题:
A zone defines a group of security devices with a common management.
A zone defines the geographic region in which the security device is deployed.
A zone defines a group of network segments with similar security requirements.
A zone defines a group of network segments with similar class-of-service requirements.
第22题:
The database automatically determines the extent-sizing policy for the tablespace.
The segments are automatically shrunk when the contents are removed from them.
The allocation of extents within the tablespace is managed through the dictionary tables.
The space utilization description of the data blocks in segments is recorded inbitmapblocks.
The space utilization description of the data blocks in segments is managed through free lists.MANUAL
第23题:
source address
options
sequence number
sources
destination port
checksum