Which of the following risk strategy options have you engaged in?

You have implemented a new security control. Which of the following risk strategy options have you engaged in?A . Risk AvoidanceB . Risk AcceptanceC . Risk TransferD . Risk MitigationView AnswerAnswer: D

June 16, 2021 No Comments READ MORE +

What is the maximum amount of bandwidth that can be reserved?

An administrator is utilizing Network I/O Control (NIOC) to allocate bandwidth utilization on a physical 10 Gbps adapter. What is the maximum amount of bandwidth that can be reserved? (Choose the best answer.)A . 2.5 GbpsB . 10 GbpsC . 5.0 GbpsD . 7.5 GbpsView AnswerAnswer: D Explanation: Reference: https://docs.vmware.com/en/VMware-NSX-T-Data-Center/2.4/installation/GUID-9A8FD62A-F099-4329-8220-6D5853F9A62D.html...

June 16, 2021 No Comments READ MORE +

What does the default "local" Terraform backend store?

What does the default "local" Terraform backend store?A . tfplan filesB . Terraform binaryC . Provider pluginsD . State fileView AnswerAnswer: D Explanation: The local backend stores state on the local filesystem, locks that state using system APIs, and performs operations locally. Reference: https://www.terraform.io/docs/language/settings/backends/local.html

June 16, 2021 No Comments READ MORE +

What are two possible ways the administrator can accomplish this task?

A company has a vSphere environment consisting of the following characteristics: ✑ A content library named ‘CORP’ is published at corporate headquarters on a vCenter Server named ‘vcenterCorp’. ✑ A regional data center contains a set of hosts managed by a vCenter Server named vcenterR1. ✑ vcenterR1 subscribes to the...

June 16, 2021 No Comments READ MORE +

Which solution should you choose?

A company uses Microsoft 365. Employees frequently work from home. They must be able to access custom applications that are not installed on their personal laptops. You need to identify a solution that meets the requirement. Which solution should you choose?A . Microsoft AccessB . Power Virtual AgentC . Microsoft...

June 16, 2021 No Comments READ MORE +

Which of the following regulations is of MOST importance to be tracked and managed by this process?

A global retail company is creating a new compliance management process. Which of the following regulations is of MOST importance to be tracked and managed by this process?A . Information Technology Infrastructure Library (ITIL)B . International Organization for Standardization (ISO) standardsC . Payment Card Industry Data Security Standards (PCI-DSS)D ....

June 16, 2021 No Comments READ MORE +

Which remediation setting is supported only on select hardware platforms?

An administrator is configuring ESXi host behavior before and during the remediation process. Which remediation setting is supported only on select hardware platforms? (Choose the best answer.)A . VM migrationB . HA admission controlC . Maintenance mode failuresD . Quick BootView AnswerAnswer: D Explanation: Reference: https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere-lifecycle-manager.doc/GUID-472964C3-70F3-4B83-8B1E-6C7CB4906DF8.html

June 16, 2021 No Comments READ MORE +

Why do we need to test a disaster recovery plan regularly, and keep it up to date?

Why do we need to test a disaster recovery plan regularly, and keep it up to date?A . Otherwise the measures taken and the incident procedures planned may not be adequateB . Otherwise it is no longer up to date with the registration of daily occurring faultsC . Otherwise remotely...

June 16, 2021 No Comments READ MORE +

Which of the following assignments are possible when you set up organizational units for sales? Choose Three correct answers.

Which of the following assignments are possible when you set up organizational units for sales? Choose Three correct answers.A . Assign a shipping point to multiple plants.B . Assign a plant to multiple company codes.C . Assign a plant to multiple sales organizations/distribution channels.D . Assign multiple plants to one...

June 16, 2021 No Comments READ MORE +

Which encryption strategy should a developer use to meet these requirements?

A software company needs to make sure user-uploaded documents are securely stored in Amazon S3. The documents must be encrypted at rest in Amazon S3. The company does not want to manage the security infrastructure in-house, but the company still needs extra protection to ensure it has control over its...

June 16, 2021 1 Comment READ MORE +