it supports very large data-sets such as the result-sets from large search queries to be held in memory
it provides a set of management tools that enables automation of configuration
it provides enhanced visibility across the entire application infrastructure
it significantly increases the performance of Web-based applications with no code change
第1题:
In Cisco Nexus 1000V deployments which two statements are true?()
第2题:
Which two statements are true about the protocols that are used for transmitting voice traffic?()
第3题:
Which three are true about the large pool for an Oracle database instance that supports shared serverconnections?()
第4题:
Vmware provides the VNIC and drivers
Vmware provides the VNIC and Cisco provides the drivers
Cisco provides the switching and management of switching
Cisco provides the switching and Vmware provides the management of switching
第5题:
ASM provides mirroring on file by file basis.
ASM provides automatic load balancing across all ASM disks.
ASM supports the Oracle database and operating system files.
ASM can be used to store trace files, alert log files, and the server parameter file (SPFILE).
第6题:
it supports very large data-sets such as the result-sets from large search queries to be held in memory
it provides a set of management tools that enables automation of configuration
it provides enhanced visibility across the entire application infrastructure
it significantly increases the performance of Web-based applications with no code change
第7题:
A user cannot set privileges on the persistent lightweight jobs
Persistent lightweight jobs generate a large amount of metadata
It is possible to create fully self-contained persistent lightweight jobs
The use of a template is mandatory to create persistent lightweight jobs
Persistent lightweight jobs are useful when users need to create a large number of jobs in a short time
第8题:
they offer simpler management in large internetworks.
you can control logging messages.
they allow packets to be filtered based on upper-layer session information.
you can set a time-based security policy.
they provide a level of security against spoofing.
they are used to authenticate individual users
第9题:
It requires OSPF version 3.
automatically detects neighbors over NHMA interfaces
It supports encryption using
It uses LSA type 9
It uses LSA type 8
第10题:
It supports fast synchronization at starting and before network failures
It supports automatic server discovery
It uses a fixed-point arithmetion
It supports the nanokernel kernel implementation
It does not support Public-Key Cryptography
第11题:
It can reach no further than human voice.
It can reach a large audience.
It is rapid and efficient.
It can be trusted.
第12题:
It can be set at the system, session, or table level.
It is used only across statements in the same session.
It can store the results from normal as well as flashback queries.
It can store the results of queries based on normal,temporary,and dictionary tables.
第13题:
Which two statements about the DiffServ QoS model are true?()
第14题:
Which two statements are true about Oracle ActiveCache ?()
第15题:
Which two statements about Automatic Storage Management (ASM) are true?()
第16题:
OEM can do management and monitoring across multiple WLS Domains
OE is a unified solution for management and monitoring across entire architecture - Web Tier, App Tier & DB Tier
OEM is focused solely on Oracle solutions, cannot manage 3rd party products
OEM includes tools to configure the operating system
第17题:
It also supports PAT.
PAT is not supported.
It allows the use of an address pool.
It requires you to configure an address in the junos-global zone.
第18题:
A user cannot set privileges on the persistent lightweight jobs
Persistent lightweight jobs generate a large amount of metadata
It is possible to create fully self-contained persistent lightweight jobs
The use of a template is mandatory to create persistent lightweight jobs
Persistent lightweight jobs are useful when users need to create a large number of jobs in a short time
第19题:
DiffServ requires RSVP to set up a path through the network to accommodate the requested QoS.
Network traffic is identified by class, and the level of service is chosen for each class.
The DiffServ model relies on a fairly simple mechanism to provide QoS over a wide range of equipment.
RSVP enables the DiffServ model to provide end-to-end QoS.
The DiffServ model is more scalable than the IntServ model.
The flow-based approach of the DiffServ model is ideal for large scalable implementations such as the public Internet.
第20题:
they offer simpler management in large internetworks.
you can control logging messages.
they allow packets to be filtered based on upper-layer session information.
you can set a time-based security policy.
they provide a level of security against spoofing.
they are used to authenticate individual users.
第21题:
it provides enhanced visibility across the entire application infrastructure
it provides a set of management tools that enable automation of configuraion
it significantly increases the performance of Web-based applications with no code change
it dramatically reduces costs associated with diagnostics, configuration, and deployment on production servers
第22题:
Voice traffic data flow involves large volumes of large packets.
Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.
Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of VoIP communication.
Voice packets are very sensitive to delay and jitter.
Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.
第23题:
RTP multiplexing is used to keep multiple phone conversations separate
RTP provides end-to-end delivery services for voice traffic.
UDP is used to ensure a reliable transmission from sender to receiver.
RTP is used to provide resource reservation for the voice stream.
UDP provides multiplexing of multiple phone conversations.
第24题:
Allocates memory for RMAN backup and restore operations
Allocates memory for shared and private SQL areas
Contains a cursor area for storing runtime information about cursors
Contains stack space
Contains a hash area performing hash joins of tables