-
Which two statements about bigfile tablespaces are true? ()
A . The bigfile tablespace have only one data file.
B . The segment space management is automatic.
C . The extent management is dictionary managed.
D . The database can have only one bigfile tablespace.
E . The bigfile tablespace can be converted to a smallfile tablespace.
-
Which two statements about SCSI are true? ()
A . The bus is limited to 32 devices
B . It is a full duplex serial standard
C . It is a half-duplex serial standard
D . It allows up to 320 MB/s of shared channel bandwidth
-
Which two statements are true about MLP interleaving? ()
A . It fragments and encapsulates all packets in a fragmentation header.
B . Packets smaller than the fragmentation size are interleaved between the fragments of thelarger packets.
C . Packets larger than the fragmentation size are always fragmented, and cannot be interleaved,even if the traffic is voice traffic.
D . It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.
-
Which two statements about zoning are correct? ()
A . Zoning increases security.
B . DNS queries are used for software zoning.
C . Software zoning is more secure than hardware zoning.
D . When using zones and VSANs together, the zone is created first.
E . Zoning requires that VSANs be established before it becomes operational.
-
Which two statements about SA caching are true?()
A . Caching allows pacing of MSDP messages.
B . Caching reduces join latency.
C . Caching should not be done by an MSDP speaker.
D . Caching is used to update the BGP MDT address family.
-
Which two statements are correct about database transportation?() (Choose two.)
A . The source and target platforms must be the same
B . Redo logs, control files and temp files are also transported
C . The transported database must have the same database identifier (DBID) as the source database and cannot be changed
D . The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transported
E . Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format
-
Which two statements about subqueries are true? ()
A . A single row subquery can retrieve data from only one table.
B . A SQL query statement cannot display data from table B that is referred to in its subquery, unless table B is included in the main query's FROM clause.
C . A SQL query statement can display data from table B that is referred to in its subquery, without including table B in its own FROM clause.
D . A single row subquery can retrieve data from more than one table.
E . A single row subquery cannot be used in a condition where the LIKE operator is used for comparison.
F . A multiple-row subquery cannot be used in a condition where the LIKE operator is used for comparison.
-
Which two statements are correct about database transportation? ()
A . The source and target platforms must be the same
B . Redo logs, control files and temp files are also transported
C . The transported database must have the same database identifier (DBID) as the source database and cannot be changed
D . The COMPATIBLE parameter must be set to 10.0.0.0 or higher and the database must be opened in readonly mode before being transported
E . Recovery Manager (RMAN) is used to convert the necessary data files of the database if the target platform is different and has different endian format
-
Which two statements about WRED are true? ()
A . WRED can selectively discard lower priority traffic when the interface becomes congested and can provide differentiated performance characteristics for different classes of service.
B . Resource Reservation Protocol (RSVP) and WRED cannot be configured on the same interface.
C . WRED will throttle back voice traffic only as a last resort.
D . If the average queue length is greater than the minimum threshold but less than the maximum threshold, then based on the drop probability, WRED will either queue the packet or perform a random drop.
E . WRED statistically drops more packets from low-bandwidth users than high-bandwidth users. Therefore, traffic sources that generate the least traffic are more likely to be slowed down than traffic sources that generate the most traffic.
F . WRED treats non-IP traffic as precedence 4.
-
Which two statements are true about traffic shaping?()
A . Out-of-profile packets are queued.
B . It causes TCP retransmits.
C . Marking/remarking is not supported.
D . It does not respond to BECN and ForeSight Messages.
E . It uses a single/two-bucket mechanism for metering.
-
Which two statements are true about alerts()
A . Clearing an alert sends the alert to the alert history.
B . Response actions cannot be specified with server-generated alerts.
C . The nonthreshold alerts appear in the DBA_OUTSTANDING_ALERTS view.
D . Server-generated alerts notify the problems that cannot be resolved automatically and requireadministrators to be notified.
-
Which two statements are true about trust boundaries?()
A . Classifying and marking traffic should be done as close to the traffic source as possible.
B . Classifying and marking traffic should be done at the distribution layer.
C . Traffic is classified and marked as it travels through the network.
D . If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.
E . The trust boundary moves depending on the type of traffic entering the network.
-
Which two statements are true about checkpointing()
A . The checkpoint frequency decreases with the smaller redo log file size.
B . It ensures that all committed data is written to the data files during normal shutdown.
C . The frequent full checkpoint in a database can cause the overall degradation of the database performance.
D . It prompts the Checkpoint (CKPT) process to write data to the data files and redo information to the online redo log files.
-
Which two statements are true about voice VLANs?()
A . Voice VLANs are only used when connecting an IP phone and a host to distinct switch ports
B . Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phones
C . Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phone
D . Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration command
E . Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the port
F . Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS marking
-
Which two statements are true about constraints? ()
A . The UNIQUE constraint does not permit a null value for the column.
B . A UNIQUE index gets created for columns with PRIMARY KEY and UNIQUE constraints.
C . The PRIMARY KEY and FOREIGN KEY constraints create a UNIQUE index.
D . The NOT NULL constraint ensures that null values are not permitted for the column.
-
Which two statements about zoning are correct?()
A . Zoning increases security.
B . DNS queries are used for software zoning.
C . Software zoning is more secure than hardware zoning.
D . When using zones and VSANs together, the zone is created first.
E . Zoning requires that VSANs be established before it becomes operational.
-
Which two statements are true about simple views?()
A . Views can be created as read only.
B . Views are data segments like tables.
C . Views can be created on the basis of more than one table.
D . Data manipulation language (DML) operations cannot be performed on views.
-
Which two statements about sequences are true? ()
A . You use a NEXTVAL pseudo column to look at the next possible value that would be generated from a sequence, without actually retrieving the value.
B . You use a CURRVAL pseudo column to look at the current value just generated from a sequence, without affecting the further values to be generated from the sequence.
C . You use a NEXTVAL pseudo column to obtain the next possible value from a sequence by actually retrieving the value from the sequence.
D . You use a CURRVAL pseudo column to generate a value from a sequence that would be used for a specified database column.
E . If a sequence starting from a value 100 and incremented by 1 is used by more then one application, then all of these applications could have a value of 105 assigned to their column whose value is being generated by the sequence.
F . You use REUSE clause when creating a sequence to restart the sequence once it generates the maximum value defined for the sequence.
-
Which two statements about views are true? ()
A . A view can be created as read only.
B . A view can be created as a join on two or more tables.
C . A view cannot have an ORDER BY clause in the SELECT statement.
D . A view cannot be created with a GROUP BY clause in the SELECT statement.
E . A view must have aliases defined for the column names in the SELECT statement.
-
Which two statements are true about RED?()
A . RED randomly drops packets before the queue becomes full.
B . RED is always useful,without dependency on flow.
C . RED increases the drop rate as the average queue size increases.
D . RED has a per-flow intelligence.
-
Which two statements about VPLS are true? ()
A . There is a full mesh of pseudowires.
B . There is a partial mesh of pseudowires.
C . Only L2TPv3 can be used for pseudowire establishment.
D . There is split-horizon to avoid loops.
-
Which two statements about EIGRP are true?()
A . EIGRP supports VLSM, route summarization, and routing update authentication.
B . If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.
C . Passive routes are in the process of being calculated by DUAL.
D . EIGRP exchanges full routing table information with neighboring routers with every update.
E . A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.
-
Which two statements are true about CAC?()
A . CAC is implemented in the call setup phase to allocate bandwidth resources
B . CAC is implemented in the call maintenance phase to allocate bandwidth resources
C . CAC is utilized during the call teardown phase to ensure that all resources have been released
D . CAC uses the Cisco RSVP (Resource Reservation Protocol) Agent to integrate call-processing capabilities with the underlying network infrastructure
E . CAC is implemented in the call setup phase to determine the destination of the call