Enjoy 15% Discount With Coupon 15off

Monthly Archives - January 2020

Which combination of Google technologies will meet all of their requirements?

Mountkirk Games wants to set up a real-time analytics platform for their new game. The new platform must meet their technical requirements. Which combination of Google technologies will meet all of their requirements?A . Kubernetes Engine, Cloud Pub/Sub, and Cloud SQLB . Cloud Dataflow, Cloud Storage, Cloud Pub/Sub, and BigQueryC...

Read more...

For this question, refer to the Dress4Win case study. Considering the given business requirements, how would you automate the deployment of web and transactional data layers?

For this question, refer to the Dress4Win case study. Considering the given business requirements, how would you automate the deployment of web and transactional data layers?A . Deploy Nginx and Tomcat using Cloud Deployment Manager to Compute Engine. Deploy a Cloud SQL server to replace MySQB . Deploy Jenkins using...

Read more...

What is the appropriate compliance control for identifying politically exposed persons (PEPs) according to the Basel Committee’s paper on Customer Due Diligence for Banks?

What is the appropriate compliance control for identifying politically exposed persons (PEPs) according to the Basel Committee’s paper on Customer Due Diligence for Banks?A . Determining that a local figure is a PEPB . Reviewing when a relationship is establishedC . Reviewing relationships at account opening and on a periodic...

Read more...

Which two actions should you perform?

You have an Azure subscription that contains a storage account named account1. You plan to upload the disk files of a virtual machine to account1 from your on-premises network. The on­ premises network uses a public IP address space of 131.107.1.0/24. You plan to use the disk files to provision...

Read more...

According to the COSO enterprise risk management framework, which of the following best describes this risk management strategy?

An organization decided to install a motion detection system in its warehouse to protect against after-hours theft. According to the COSO enterprise risk management framework, which of the following best describes this risk management strategy?A . Avoidance.B . Reduction.C . Elimination.D . Sharing.View AnswerAnswer: B

Read more...

Which priority is correct for the passive firewall?

An administrator has been asked to configure active/passive HA for a pair of Palo Alto Networks NGFWs. The administrator assigns priority 100 to the active firewall. Which priority is correct for the passive firewall?A . 0B . 99C . 1D . 255View AnswerAnswer: D Explanation: Reference: https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/framemaker/71/pan-os/pan-os/section_5.pdf (page 9)

Read more...

Which LIF type is used by default for hardware-assisted storage failover communication?

Which LIF type is used by default for hardware-assisted storage failover communication?A . interclusterB . node-mgmtC . dataD . cluster-mgmtView AnswerAnswer: B Explanation: Reference: https://docs.netapp.com/ontap-9/index.jsp?topic=%2Fcom.netapp.doc.dot-cm-cmpr-950% 2Fstorage__failover__hwassist__show.html

Read more...

You completed the installation of an AFF A700s with NetApp CN1610 switches. You used ports e0a and e0f with breakout cables to connect the controllers to the interconnect switches. After completing the cluster setup, ports e0e and e0i are not visible in OnCommand System Manager. In this scenario, what caused this problem?

You completed the installation of an AFF A700s with NetApp CN1610 switches. You used ports e0a and e0f with breakout cables to connect the controllers to the interconnect switches. After completing the cluster setup, ports e0e and e0i are not visible in OnCommand System Manager. In this scenario, what caused...

Read more...

Which administrative tasks can be performed using the EMC Avamar Enterprise Manager?

Which administrative tasks can be performed using the EMC Avamar Enterprise Manager?A . Configure replication, run reports, and view operational statusB . Configure backups, view operational status, and run reportsC . Run reports, configure backups, and configure replicationD . View operational status, configure replication, and configure backupsView AnswerAnswer: A Explanation:...

Read more...