Enjoy 15% Discount With Coupon 15off

Monthly Archives - February 2019

Which three statements about the Cisco IOS XR task-based user authorization method are true? (Choose three.)

Which three statements about the Cisco IOS XR task-based user authorization method are true? (Choose three.)A . A user's association with a particular user group links that user to a particular set of task IDs. A user that is associated with a task ID can execute any operation associated with...

Read more...

At a minimum, what must the administrator do to enable CDP to exchange information between R1 and R2?

Refer to the exhibit. The two routers have had their startup configurations cleared and have been restarted. At a minimum, what must the administrator do to enable CDP to exchange information between R1 and R2?A . Configure the router with the cdp enable command.B . Enter no shutdown commands on...

Read more...

What should you do?

You administer a Microsoft SQL Server 2012 server. The MSSQLSERVER service uses a domain account named CONTOSOSQLService. You plan to configure Instant File Initialization. You need to ensure that Data File Autogrow operations use Instant File Initialization. What should you do? Choose all that apply.A . Restart the SQL Server...

Read more...

Which two actions should you perform?

You deploy a SharePoint2016 environment. You configure outgoing email settings for all SharePoint Servers. You need to enable encrypted communication between all SharePoint Servers and the enterprise SMTP server. Which two actions should you perform? Each correct answer presents part of the solution.A . Configure the SMTP server to support...

Read more...

 In order to ensure that the firewall can effectively protect the network from external attacks, which of the following basic practices should be followed?

 In order to ensure that the firewall can effectively protect the network from external attacks, which of the following basic practices should be followed?A . Only allow the necessary external services.B . All external communications must go through firewall.C . The firewall must be placed in non-protected area (DMZ)D...

Read more...

Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet? (Choose two.)

Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet? (Choose two.) A. Completely disconnect the network from the Internet. B. Deploy a stateful edge firewall. C. Buy an insurance policy A. against attack-related business losses. D. Implement a password management...

Read more...

What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 is an enterprise root certification authority (CA) for contoso.com. Your user account is assigned the certificate manager role and the auditor role on the contoso.com CA. Your...

Read more...