QUESTION 1 What is the purpose of a network mask? A. It is used to identify the maximum hop count of a subnetwork B. It is used to identify an IP address as either private or public C. It is used to identify the network to which an IP address belongs D. It is used […]
QUESTION 1 Which type of cable is required to access the router’s console port from a PC? A. modem B. Ethernet C. null modem D. straight-through Answer: C
QUESTION 1 You work at a small, but rapidly expanding chain of retail stores. You have a private cloud in place which works well most of the year, but to manage the annual holiday peak load on your Internet store, you have decided to utilize a hybrid cloud as needed. Which two components are required […]
QUESTION 1 You have a virtual machine that requires a software update. You have not yet tested the update, so you need a back out plan. If the update fails you want to recover the VM to its current state. Which of the following features will help you do this in the least amount of […]
QUESTION 1 Identify three components of an Oracle instance for which you can change the size dynamically. (Choose three.) A. Java Pool B. Large Pool C. Shared Pool D. Redo Log Buffer E. Database Buffer Cache Answer: BCE
QUESTION 1 When querying the v$sysstat, v$sesstat or v$mystat views, you notice the statistic “workarea executions – onepass”. What is the meaning of this statistic? A. It is the cumulative count of work areas running in more than one pass. B. It is the total amount of PGA memory dedicated to the work areas using […]
QUESTION 1 What is a description of Governance? A. How IT resources will be used to meet goals and deliver business value B. a process that ensures individualsare aware of regulations, policies, and procedures that must be followed as a result of senior management decisions management C. Who holds the authority to make decisions, determines […]
QUESTION 1 Data is being replicated from site A to site B using disk buffering to create extended distance consistent point in time copies every hour. In the event of a site failure at A, what is the maximum amount of data that will be missing at site B? A. 1 hour B. 2 hours […]
QUESTION 1 Which two statements are true about the use of direct path loads when selecting from external tables in a database on a Database Machine? A. INSERT INTO . . . SELECT FROM statements, executed serially, which select from external tables, require the APPEND hint to use direct path loading. B. CREATE TABLE . […]
QUESTION 1 What items need to be evaluated when choosing a scanner? A. Documents, images, and storage medium B. Resolution, compression, and memory C. Workflow, ease of use, and productivity D. Interface, resolution, and paper handling Answer: D QUESTION 2 When designing the input environment for the proposed Document Management System (DMS), which of the […]
QUESTION 1 An architectural review is BEST for finding which of the following security defects? A. Malware infection vectors B. SQL or other injection flaws C. Design flaws D. Zero-day vulnerabilities Answer: C QUESTION 2 Which of the following describes a security risk that may have to be accepted when using a commercial cross-platform mobile […]
QUESTION 1 A technician installs an additional hard drive controller. Which of the following processes will MOST likely prevent errors? A. 1) Apply System Updates 2) Update the BIOS 3) Install the card 4) Install the driver 5) Upgrade the Card Firmware B. 1) Install the card 2) Update the BIOS 3) Upgrade the Card […]
QUESTION 1 Which of the following is the access level of a user that belongs to both the Administrators and Users groups? A. User B. Administrator C. Power User D. Remote Desktop User Answer: B QUESTION 2 Which of the following contains the user profile directory for Microsoft Windows 2000 and XP? A. Users B. […]
QUESTION 1 Which two steps should an administrator take to remove an Access Gateway appliance from an Access Gateway 4.5 Advanced Edition deployment? (Choose two.) A. The administrator should execute the “Remove Access Gateway” task from the “Gateway Appliances” node in the Access Management Console. B. The administrator should restart at least one Advanced Access […]
QUESTION 1 Scenario: An administrator is implementing a two-factor authentication solution with an RSA SecureID product. The administrator already has the server name and port number of the RSA server. Which additional information does the administrator need to configure RSA SecureID? A. LDAP password B. Firewall access rule C. Authentication policy D. RADIUS shared secret […]

