-
Which two tunneling techniques in IPv6 do not require an IPv4 tunnel destination in the configuration?()
A . 6to4
B . 6over4
C . ISATAP
D . GRE
-
You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()
A . Enable root guard to mitigate ARP address spoofing attacks.
B . Configure DHCP spoofing to mitigate ARP address spoofing attacks.
C . Configure PVLANs to mitigate MAC address flooding attacks.
D . Enable root guard to mitigate DHCP spoofing attacks.
E . Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted ports.
F . Configure port security to mitigate MAC address flooding
G . None of the other alternatives apply
-
Which technique retrieves the error number when explicit DML fails?()
A . SQLCODE in an On-Error trigger.
B . SQLCODE in an exception handler.
C . DBMS_ERROR_CODE in an On-Error trigger.
D . DBMS_ERROR_CODE in an exception handler.&e
-
Which of the following techniques is used to extract the /usr/tmp directory from a mksysb backup?()
A . Use the tar command on the fifth image.
B . Use the restore command on the fourth image.
C . Use tctl -f /dev/rmt0.1 fsf 3 followed by the tar command on the fourth image.
D . Reboot using the mksysb tape and then use the dd command to extract the file.
-
Given the following expression about TextField which use a proportional pitch font. TextField t = new TextField("they are good",40); Which statement is true?()
A . The displayed string can use multiple fonts.
B . The maximum number of characters in a line will be 40.
C . The displayed width is exactly 40 characters.
D . The user can edit the characters.
-
Which of the following is the most effective technique to prevent source IPAddress spoofing?()
A . policy based routing (PBR)
B . unicast reverse path forwarding (uRPF)
C . lock and keyACL
D . RFC 1918filtering
E . IP source routing
-
Which three options are network evaluation techniques? ()
A . Performing end-user training on the use of antispyware software
B . Performing virus scans
C . Scanning a network for active IP addresses and open ports on those IP addresses
D . Using password-cracking utilitie
-
all of the following tools and techniques are helpful to acurately confirming customers needs except ()
A . A、questionnaires
B . B、prototyping approaches
C . C、fishbone diagrams
D . D、interviews
-
Techniques to employ the energy of the sun are being developed.
A . convert
B . store
C . utilize
D . receive
-
There are different styles of reading for different situations. The technique you choose will depend on the______.
-
Which of the following techniques is similar to the math equation, x = y?
-
Which of the following is not a technique of internal hedging?
-
Which of the following techniques is NOT used in the Grammar-Translation Method?
-
In Woolf’s novels, emphasis is not on plot or action but on the psychological realm of her characters and the moment-by –moment experience of living which are depicted by the techniques of interior monologue and______.
-
There are two powerful techniques of circuit analysis that aid in the analysis of complex circuit structures: the node-voltage method and the _________ method.
-
There are other problems which I don’t propose to _________ at the moment.
A) go into B) go around
C) go for D) go up
-
Oracle RDBMS is a distributed DBMS. Which of the following techniques adapted ensure atomicity of distributed transaction? ()
A.Two Phases Commit (2PC)
B.Remote Procedure Call (RPC)
C.triggers
D.snapshots
-
Techniques______the energy of the sun are being developed.
A.harnessing
B.aiming
C.assisting
D.attempting
-
Techniques to employ the energy of the sun are beingdeveloped.
A. convert
B. store
C. utilize
D. receive
-
In ZTE's T-MPLS protection, which of the following external commands are supporte
A.A.nworking lock
B.B.nprotection lock
C.C.nforced switching
D.D.nmanual switching
-
About 1+1 T-MPLS path protection structure, which of the following are correct?
A.nIn 1+1 T-MPLS path protection structure, each working connection has a specific protection connection; working connection and protection connection are bridged at source end of protecting domain.
B.nIn 1+1 T-MPLS path protection structure, if a unidirectional fault (transmission direction from node A to Z) occurs to working connection, it will be detected at sink node Z of protecting domain and then node Z selector will switch to protection connectio
C.n1+1 T-MPLS path protection is of unidirectional switching type -- that is to say, only the affected end needs to switch to the protection path and selectors at the two ends are relatively independent.
D.nIn 1+1 T-MPLS path protection structure, to avoid single-point fault, working connection and protection connection should run along isolated routes.
此题为多项选择题。
-
Perform Quality Control is the process of monitoring and recording results*of executing the Quality Plan activities to assess performance and recommend necessary changes.() are the techniques and tool
A.①②③④
B. ②③④⑤
C. ①②③⑤⑥
D. ①③④⑤⑥
-
12、李唐采薇图采用哪种描法 Li Tang's Gathering Wild Herbs uses which of the following techniques?
A.折芦描folded rush leaf line
B.柳叶描willow-leaf-shaped stroke
C.枯柴描dry firewood line
D.混描mixed and layered line
-
Which of the following is not the face-changing technique?
A.Wiping Mask.
B.Swinging Mask.
C.Blowing Mask.
D.Pulling Mask.