-
You work as a network engineer for . You study the exhibit carefully.
What happens when the switch 2 is connected to the rest of the network in the VTP domain Lab_Network?()
Exhibit:
https://assets.asklib.com/images/image2/2018073016373365008.jpg
A . The recently introduced switch 2 removes all configured VLANs throughout the VTP domain.
B . The recently introduced switch 2 creates a STP loop in the VTP domain.
C . The recently introduced switch 2 switches over to VTP transparent mode in order to be included into the VTP domain.
D . A trunk should be configured between the two switches in order to integrate 2 into the VTP domain.
E . The recently introduced switch 2 adds one more VLAN to the VLAN database in the VTP domain.
-
EIGRP is being used as the routing protocol on the company network. While troubleshooting somenetwork connectivity issues, you notice a large number of EIGRP SIA (Stuck in Active) messages.What causes these SIA routes?()
A . The neighboring router stops receiving ACK packets from this router
B . The neighboring router starts receiving route updates from this router
C . The neighboring router is too busy to answer the query (generally caused by high CPUutilization)
D . The neighboring router is having memory problems and cannot allocate the memory to processthe query or build the reply packet
-
You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()
A . The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tag
B . No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the core
C . Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tags
D . IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these off
E . MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layer
F . The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped
-
You work as a network technician at Company. Your boss, Mrs., is interested in the Cisco Compatible Extensions program. What are three features of this program? ()
A . Accounting
B . Analog and digital voice
C . Mobility
D . Security
E . Routing and switching
F . VLAN and QoS
-
You plan to use SQL Performance Analyzer to analyze the SQL workload. You created a SQL Tuning Set as a part of the workload capturing. What information is captured as part of this process?()
A . the SQL text
B . the execution plan
C . the execution context
D . the execution frequency
E . the system change number (SCN)
-
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.Which of the following options can be you in order to change the permissions settings for a public folder?()
A . You must use the Active Directory Users and Computers.
B . You must use the Microsoft Office Outlook.
C . You must use the Mail Flow Troubleshooter.
D . You must use the Exchange Server Jetstress 2010.
-
You work as a database administrator for Supportcenter.cn. Your database is in the MOUNT state and you execute the following command to open it ALTER DATABASE OPEN; What two actions are performed as a result of this command?()
A . All control files are opened
B . All redo files are opened
C . The password file is opened
D . The parameter file is opened
E . All online data files are opened
-
EIGRP is being used as the routing protocol on the PassGuide network. Whiletroubleshooting some network connectivity issues,you notice a large number of EIGRP SIA(StuckinActive)messages. What causes these SIA routes()
A . The neighboring router stops receiving ACK packets from this router.
B . The neighboring router starts receiving route updates from this router.
C . The neighboring router is too busy to answer the query(generally caused by high CPU utilization).
D . The neighboring router is having memory problems and cannot allocate the memory to process the query or build the reply packet.
-
What equipment is customarily used when seamen are working on a stage rigged over the side of a vessel().
A . Jacob's ladder
B . Manropes
C . Heaving lines
D . All of the above
-
You work as a network technician at Company. Your boss, Mrs. , is interested in GLBP. In particular, she wants to know the multicast address that this protocol uses. What should you tell her? ()
A . 224.0.0.100
B . 224.0.0.1
C . 224.0.0.102
D . 224.0.0.10
E . 224.0.0.101
F . None of the other alternatives apply
-
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to change the Exchange-specific cost for a site link?()
A . You must configure the host (A) resource records.
B . You must add and configure an IPSec Enforcement Network policy.
C . You must create an Outlook Web App Mailbox policy.
D . You must use the Set-ADSiteLink cmdlet.
-
You plan to use SQL Performance Analyzer to analyze the SQL workload. You created a SQL Tuning Set as a part of the workload capturing. What information is captured as part of this process?()
A . the SQL text SQL
B . the execution plan
C . the execution context
D . the execution frequency
E . the system change number (SCN)
-
What is the maximum number of users that can be added to an autonomous access point that is being used as a local authenticator?()
A . 75
B . 100
C . 25
D . 50
-
When discussing plant maintenance with plant maintenance managers, frequently the topic of using preventive maintenance (PM) comes up. If this is used extensively and the PM work orders are regularly completed, what is told by this about the operation?()
A . It is likely that equipment will break down frequently.
B . It is likely that equipment will break down infrequently.
C . It shows that maintenance is performed on an as needed basis.
D . It shows that there are frequent crises when it comes to maintaining equipment.
-
What is used as an indicator of initial stability? ()
A . GM
B . KG
C . KM
D . GZ
-
You work as an application developer at Contoso.com. You use Microsoft .NET Framework 3.5 and Microsoft ADO.NET to develop an application. You want to make sure that the application is operative to any type of database. What should you do?()
A . Set the database driver name in the connection string of the application, and then the connection object as follows: DbConnection connection = new OdbcConnection(connectionString);
B . Create the connection object as follows: DbProviderFactory factoryDbProviderFactories.GetFactory(databaseProviderName); DbConnection connection =factory.CreateConnection();
C . Create the connection object as follows: DbProviderFactory factory = DbProviderFactories.GetFactory("System.Data.Odbc"); DbConnection connection = factory.CreateConnection();
D . Set the database driver name in the connection string of the application, and then the connection object as follows:DbConnection connection = new OleDbConnection(connectionString);
-
In terms of memory, what is primary the problem with using eye-witness testimony as evidence in legal cases?
-
The sentence “As cold waters to a thirsty soul, so is good news from a far country.” is from the “Bible”. What kind of figure of speech is used?
-
What is the component of working memory that is used to solve problems?
-
What is NOT mentioned as a use of the donations?
A.To update recycling lists.
B.To teach ordinary people.
C.To expand environmental services.
D.To support environmental activists.
-
Cancer is used generically for more than 100 different diseases, including malignant tumors of different sites such as breast, stomach, colon, lung and mouth.【1】The disease arises principally as a consequence of individual exposure to the substances that cause cancer in what individuals inhale, eat and drink, or are exposed to in their personal or work environment. Personal habits, such as tobacco use, dietary and physical activity patterns—well as occupational and environmental conditions—rather than genetic factors, play the major roles in the development of cancer.
Many of the chronic diseases risk and the diseases themselves overlap. In developed countries, cancer is the second-biggest cause of death after cardiovascular disease (CVD), and epidemiological evidence points to this trend emerging in the less developed world. This is particularly true in countries of "transition" or middle income countries such as in South America and Asia. Already more than half of all cancer cases occur in developing countries.
There are approximately 20 million people living with cancer at the moment; by 2020 there will an estimated 30 million. And the impact is far greater than the number of cases alone would suggest.【2】Regardless of prognosis, the initial diagnosis is of- ten perceived by patients as life-threatening, with over one-third of sufferers experiencing clinical anxiety and depression. Cancer can also be profoundly distressing as well as economically disruptive to patients' families. The clinical care of cancer patients is a costly element in public health budgets.
【3】Dietary factors are estimated to account for approximately 30% of cancers in Western countries, making diet second only to tobacco as a preventable cause of cancer. This proportion is thought to be about 20% in developing countries and is projected to grow. As developing countries become urbanized, patterns of cancer, particularly those most strongly associated with diet and physical activity, tend to shift towards the patterns of economically developed countries. Cancer rates also change as populations move between countries and adopt different dietary patterns.
The relative importance of cancers as a cause of death is increasing. The incidence of lung cancer and cancers of the colon and breast generally increases in parallel with economic development, as stomach cancer declines. Cancer is also strongly associated with social and economic status. Cancer risk factors are highest in groups with the least education. In addition, patients in the lower socioeconomic classes have consistently poorer survival rates than those in higher social class.
In recent years, substantial evidence has pointed to the link from overweight and obesity, to many types of cancer such as breast and kidney.【4】The composition of the diet is also important since fruit and vegetables may have a protective effect by decreasing the risk for some cancer types such as oral and gastric cancer.
Regular physical activity has also been seen to have a protective effect in reducing the risk of breast cancer. High intake of preserved meat or red meat might be associated with increased risk of colorectal cancer. Another aspect of diet clearly related to cancer risk is the high consumption of alcoholic beverages, which convincingly increase the risk of oral cavity, liver and breast cancers.
The wealth of knowledge that already exists about cancer risk factors provides obvious and ample scope for action to reduce the cancer burden of all countries. After tobacco, overweight and obesity seems to be the most important avoidable cause of cancer.
【5】Given that poor nutrition, physical inactivity, obesity tobacco and alcohol are risk factors common to other chronic diseases such as CVD, type 2 diabetes, and respiratory diseases, conducting a cancer prevention program withi
-
If the DNA strand shown below is used as a template for RNA polymerase, what would be the sequence of the resultant mRNA following transcription 5’-CATTCCATAGCATGT-3’
A.5’-UGUACGAUACCUUAC-3’
B.5’-CAUUCCAUAGCAUGU-3’
C.5’-GUAAGGUAUCGUACA-3’
D.5’-ACAUGCUAUGGAAUG-3’
-
What rhetoric device is used in the sentence 'Many hands make light work'
A.Synecdoch
B.Simile
C.Metaphor
D.Oxymoron
-
Which of the following works is regarded as the “Declaration of Intellectual Independence”()
A.Nature
B.Self-Reliance
C.Moby Dick
D.The American Scholar