LDP uses Down Stream On Demand.
RSVP uses Down Stream On Demand.
LDP uses Down Stream Unsolicited.
RSVP uses Down Stream Unsolicited.
第1题:
Which two statements are correct about the signaling methods that are utilized for transmitting voice? ()
第2题:
Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)
第3题:
Which statement is true about IP telephony calls?()
第4题:
Which of the following statements are true? ()
第5题:
It is important to note that from the core company’s perspective, the supply chain includes (), upstream supplier and down stream customers.
第6题:
Using Job Scheduling Console, how can the external successor chain be viewed when a job needs to be canceled?()
第7题:
Which two statements are true about encrypting RMAN backup?() (Choose two.)
第8题:
The transparent encryption of backups uses the encryption wallet
The database uses the same encryption key for every encrypted backup
The password encryption of backups only uses the password while creating and restoring backup
If transparent encryption is configured, you cannot use the SET ENCRYPTION BY PASSWORD command to make password-protected backups.
第9题:
RC4 is a stream cipher
Stream ciphers require padding
AES is a block cipher
DES and 3DES are stream ciphers
AES is a stream cipher
AES, DES, and 3DES can be used as HMAC algorithms
第10题:
A based opt-in model uses virtualized identifiers
A based opt-in model uses hardware values as identifiers
A logical server opt-in model uses virtualized identifiers
A logical server opt-in model uses hardware values as identifiers
第11题:
MPLS TE supports admission control
MPLS TE tunnel traffic is a link attribute to compute the TE tunnel path
MPLS TE uses BGP extension to advertise link attributes
MPLS TE provides protection capability
MPLS TE uses RSVP to establish LSP
第12题:
Open the Set Priority panel from the job properties.
Change the priority of the job stream that contains the job.
Select the corresponding action from the Monitor jobs task panel.
Open the job stream properties and drill down to the job priority panel.
The priority of a job can only be changed from the Workload Designer.
第13题:
Which tow statements are most correct regarding opt-in models?()
第14题:
Which three are true about MPLS LSP establishment using RSVP?() (Choose three.)
第15题:
Which of the following statements is correct regarding a hybridcrypto system?()
第16题:
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()
第17题:
Using the Tivoli Dynamic Workload Console, what are two ways to change the priority of a job?()
第18题:
Which two statements regarding symmetric key encryption are true?() (Choose two.)
第19题:
uses symmetric crypto for keys distribution
uses symmetric crypto for proof of origin
uses symmetric crypto for fast encrypted/decryption
uses asymmetric crypto for message confidentiality
uses symmetric crypto to transmit the asymmetric keys that is thenused to encrypt a session
第20题:
LDP uses Down Stream On Demand.
RSVP uses Down Stream On Demand.
LDP uses Down Stream Unsolicited.
RSVP uses Down Stream Unsolicited.
第21题:
using the Hyperbolic Viewer
opening the Impact view and displaying the successors
opening the Job Stream Instance editor for its Job Stream Instance
opening the Dependencies window and drilling down to the successors
第22题:
Ordered Control
Independent Control
Down Stream Unsolicited
Liberal Label Management
Down Stream On Demand
第23题:
WPA is based on the outdated IEEE 802.11i standard.
WPA uses RSN,which uses the same base encryption algorithm as RC4.
WPA requires a hardware upgrade that may not be supported by all vendors.
WPA uses TKIP,which uses the same base encryption algorithm as WEP.
WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
WPA is susceptible to a security weakness when preshared keys are used.
第24题:
Channel-associated signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream.
Channel-associated signaling utilizes a separate TDM channel for transmitting control signals.
Common channel signaling transmits control signals in band and therefore reduces the bandwidth available for the voice data stream.
Common channel signaling uses one of the TDM channels to transmit control information reducing the number of channels available for voice.
ISDN BRIs implement channel-associated signaling.