Enjoy 15% Discount With Coupon 15off

Monthly Archives - April 2018

What is true about this configuration?

Refer to the exhibit. C-router is to be used as a "router-on-a-stick" to route between the VLANs. All the interfaces have been properly configured and IP routing is operational. The hosts in the VLANs have been configured with the appropriate default gateway. What is true about this configuration?A . These...

Read more...

Which NAS port type and which authentication method should you configure in the connection request policy?

HOTSPOT Your network contains an Active Directory forest named contoso.com. The forest contains a Network Policy Server (NPS) server named Radius1 that runs Windows Server 2016. You need to create a new connection request policy that will allow only Secure Socket Tunneling Protocol (SSTP) connections. Radius1 will manage all authentication...

Read more...

Your company has an Office 365 subscription and uses Microsoft Lync Online. The environment includes the domains shown in the following image, and is configured as shown in the exhibit. (Click the Exhibit button

HOTSPOT Your company has an Office 365 subscription and uses Microsoft Lync Online. The environment includes the domains shown in the following image, and is configured as shown in the exhibit. (Click the Exhibit button.) Lync is not deployed in a hybrid configuration. An employee requires specific Lync communication settings....

Read more...

SNMP users have a specified username, a group to which the user belongs, authentication password, encryption password, and authentication and encryption algorithms to use. The authentication algorithm options are MD5 and SHA. The encryption algorithm options are DES, 3DES, andAES (which is available in 128,192, and 256 versions). When you create a user, with which option must you associate it?

SNMP users have a specified username, a group to which the user belongs, authentication password, encryption password, and authentication and encryption algorithms to use. The authentication algorithm options are MD5 and SHA. The encryption algorithm options are DES, 3DES, andAES (which is available in 128,192, and 256 versions). When you...

Read more...

What is the maximum number of Azure Virtual Machines ("Base Instances") that the customer is entitled to license for Windows Server?

A customer has 64 Windows Server Datacenter core licenses covered with Software Assurance (SA). The customer wants to use the Microsoft Azure Hybrid Benefit. What is the maximum number of Azure Virtual Machines ("Base Instances") that the customer is entitled to license for Windows Server?A . 8B . 16C ....

Read more...

What happens on a Cisco switch that runs Cisco IOS when an RSTP-configured switch receives 802.1d BPDU?

What happens on a Cisco switch that runs Cisco IOS when an RSTP-configured switch receives 802.1d BPDU?A . 802.1d does not understand RSTP BPDUs because they are different versions, but when a RSTP switch receives an 802.1d BPDU, it responds with an 802.1d BPDU and eventually the two switches run...

Read more...