are not lasting
are both used in temples
are both based on antithesis
depend on time pattern
第1题:
A. label stacking
B. auto-provisioning
C. circuit status vector
D. Martini Encapsulation
E. LDP-based control plane
第2题:
A. Either the -a or flag -b may be used, but not both.
B. If the flag -a is used then the flag -b also must be used.
C. One of the -a or -b flags must be used, but not both at the same time.
D. Both the flags may be used together, but neither are mandatory.
第3题:
There are two extremes in music, both of which can ________ risks.
A leadin
B bringin
C contributein
D resultin
第4题:
Which statement is true about Kompella-based and Martina-based VPNs?()
第5题:
typically represented the world pattern between the two world wars()
第6题:
A server is configured with two network cards. To utilize the bandwidth of both network cards at the same time without assigning more than one IP address, which of the following load balancing techniques should be used?()
A. Clustering
B. NIC teaming
C. OSPF
D. VLAN tagging
第7题:
A. Each fiber has half of its SONET capacity reserved for protection.
B. Two fibers in the span carry working traffic, while the other two fibers in the span are reserved for protection.
C. The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.
D. The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.
第8题:
UML-based tools are often used for J2EE/.NET application analysis and design,both because UML's object orientation is ideal for the J2EE/.NET implementation(66) and because of the expanding scope and complexity of today's enterprise endeavors.(67) the approaches diverge at the coding/implementation phase,a common Set of analysis and design techniques applies to both J2EEand.NET.
The use of a virtual machine (VM) architecture is also common to J2EE and .NET. Application development tools(68) intermediate-level code instead of platform-specific binary code, which means the VM interprets that code in real time or performs Just-In-Time (JIT) compilation; the Microsoft VM always runs JIT-compiled code. This VM-based model results in(69)-independent applications and is conducive to the late-binding technique that's(70) to the OO approach.
A.block
B.model
C.module
D.group
第9题:
Which two statements correctly describe characteristics of the PortFast feature? ()
第10题:
What protection method is used in 4F MS-SPRing networks?()