Enjoy 15% Discount With Coupon 15off

Monthly Archives - October 2020

From which blade can you view the template that was used for the deployment?

You have an Azure subscription named Subscription1 that is used by several departments at your company. Subscription1 contains the resources in the following table: Another administrator deploys a virtual machine named VM1 and an Azure Storage account named Storage2 by using a single Azure Resource Manager template. You need to...

Read more...

You network contains an Active Directory named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2016

HOTSPOT You network contains an Active Directory named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2016. Server1 has IP Address Management (IPAM) installed. Server2 has the DHCP Server role installed. The IPAM server retrieves data from Server2. The domain has two users named...

Read more...

Which vCenter Server role ensures only authorized vSphere administrators have access to encryption functionality?

An organization is no longer compliant with security requirements because a vSphere administrator disabled encryption on a vSAN cluster. Which vCenter Server role ensures only authorized vSphere administrators have access to encryption functionality?A . AdministratorB . Read-onlyC . No cryptography administratorD . No accessView AnswerAnswer: C Explanation: Reference: https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.vsphere.security.doc/GUID­6C181D08-6650-4AD1-92D1-AAFDA3A3E38C.html

Read more...

Your network contains an Active Directory domain named contoso.com. The domain contains a domain-based Distributed File System (DFS) namespace named Namespace1. Namespace1 has the following configuration

HOTSPOT Your network contains an Active Directory domain named contoso.com. The domain contains a domain-based Distributed File System (DFS) namespace named Namespace1. Namespace1 has the following configuration. Namespace1 has a folder named Folder1. Folder1 has the targets shown in the following table. You have the site links shown in the...

Read more...

Which of the following steps for risk assessment methodology refers to vulnerability identification?

Which of the following steps for risk assessment methodology refers to vulnerability identification?A . Determines if any flaws exist in systems, policies, or proceduresB . Assigns values to risk probabilities; Impact values.C . Determines risk probability that vulnerability will be exploited (High. Medium, Low)D . Identifies sources of harm to...

Read more...

Which vSAN advanced setting can be adjusted to avoid rebuild operations during the host hardware maintenance?

The vSAN host memory needs to be replaced and the entire operation is expected to take 90-120 minutes. Which vSAN advanced setting can be adjusted to avoid rebuild operations during the host hardware maintenance?A . Site Read LocalityB . Forced ProvisioningC . Object Repair TimerD . Thin SwapView AnswerAnswer: C

Read more...