更多"Which three attributes are advertis"的相关试题:
[多项选择]Which three BGP attributes are always communicated in a BGP update packet? ()(Choose three.)
A. MED
B. Origin
C. AS Path
D. Next Hop
E. Aggregator
[多项选择]Which three attributes are carried in a source active message?()
A. NLRI information
B. IP address of originating RP
C. address of multicast source
D. all active RPs in the local domain
E. group address to which the source is sending
[多项选择]Which three statements are typical characteristics of VLAN arrangements?()
A. A new switch has no VLANs configured.
B. Connectivity between VLANs requires a Layer 3 device.
C. VLANs typically decrease the number of collision domains.
D. Each VLAN uses a separate address space.
E. A switch maintains a separate bridging table for each VLAN.
F. VLANs cannot span multiple switches.
[多项选择]Which three statements describe the Transmission Control Protocol (TCP)?()
A. TCP is a transport layer protocol.
B. TCP is faster than the User Datagram Protocol (UDP).
C. TCP provides delivery notification and error checking mechanisms.
D. TCP uses a best effort delivery approach.
E. TCP application examples include HTTP and SMTP.
[多项选择]Which three characteristics are indicators that a potential SMB customer is in the SBR-defined growth phase? ()
A. focusing on becoming more efficient
B. wanting greater connectivity for customers
C. requesting convergence of voice and data
D. providing a customer with a basic up-to-date website
E. needing rapid secure access to customer history, data, or buying behavior
[多项选择]Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)
A. includes three design levels
B. incorporates products and technologies into enterprise, service provider, and commercial systems
C. extends the value of designs through a sustained development plan
D. does not factor customer input design process
E. facilitates faster and more reliable customer deployments
F. incorporates a narrow range of technologies and products
[多项选择]Which three connection options are available when configuring a switch port to be part of a privateVLAN? ()(Choose three.)
A. isolated mode
B. switchport mode
C. modular mode
D. community mode
E. promiscuous mode
F. global mode
[多项选择]Which three packet interception methods are configurable in WX devices?() (Choose three.)
A. OSPF
B. WCCP
C. policy based routing
D. route injection using RIPv1
E. route injection using RIPv2
[多项选择]Which three statements correctly describe the functions and use of constraints? ()
A. Constraints provide data independence.
B. Constraints make complex queries easy.
C. Constraints enforce rules at the view level.
D. Constraints enforce rules at the table level.
E. Constraints prevent the deletion of a table if there are dependencies.
F. Constraints prevent the deletion of an index if there are dependencies.
[多项选择]Which three are true?()
A. A MERGE statement is used to merge the data of one table with data from another.
B. A MERGE statement replaces the data of one table with that of another.
C. A MERGE statement can be used to insert new rows into a table.
D. A MERGE statement can be used to update existing rows in a table.
[多项选择]Which three advanced permit actions within security policies are valid?() (Choose three.)
A. Mark permitted traffic for firewall user authentication.
B. Mark permitted traffic for SCREEN options.
C. Associate permitted traffic with an IPsec tunnel.
D. Associate permitted traffic with a NAT rule.
E. Mark permitted traffic for IDP processing.
[多项选择]Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
A. access profile
B. client group
C. client
D. default profile
E. external
[多项选择]Which three statements are true concerning unplugging a pluggable database (PDB)?()
A. The PDB must be open in read only mode.
B. The PDB must be dosed.
C. The unplugged PDB becomes a non-cdb.
D. The unplugged PDB can be plugged into the same multitenant container database (CDB)
E. The unplugged PDB can be plugged into another cdb.
F. The PDB data files are automatically removed from disk.
[多项选择]Which three applications or protocols are accelerated by AppFlow?() (Choose three.)
A. UNIX NFS protocol
B. Web-based e-mail
C. Secure Sockets Layer
D. Microsoft's Common Internet File System
E. Microsoft's Messaging Application Programming Interface
[多项选择]Which three authentication resources are grouped within an authentication realm?()
A. Authentication enforcer
B. Directory server
C. Captive authentication
D. Authentication policy
E. Role-mapping rules