Which two actions should you perform?

HOTSPOT You have an Azure subscription named Subscription1. Subscription1 contains the resources in the following table: VNet1 is in RG1. VNet2 is in RG2. There is no connectivity between VNet1 and VNet2. An administrator named Admin1 creates an Azure virtual machine VM1 in RG1. VM1 uses a disk named Disk1...

January 24, 2021 No Comments READ MORE +

Which of the following statements regarding BGP shortcuts is FALSE?

Which of the following statements regarding BGP shortcuts is FALSE?A . MPLS tunnels are used to carry transit traffic across the network.B . A full mesh of iBGP peering sessions is not required,C . Edge and transit routers need to be configured with BGE . The transit routers need to...

January 24, 2021 No Comments READ MORE +

What does it mean to say that an event has a time-box?

What does it mean to say that an event has a time-box?A . The event must happen at a set time.B . The event must happen by a given time.C . The event must take at least a minimum amount of time.D . The event can take no more than...

January 24, 2021 No Comments READ MORE +

In a stateless IPv6 auto-configuration scenario, what is the host’s IPv6 address if the interface’s MAC address is 12:34:ab:cd:ef:56?

In a stateless IPv6 auto-configuration scenario, what is the host’s IPv6 address if the interface’s MAC address is 12:34:ab:cd:ef:56?A . fe80::1234:abff:fecd:ef56/64B . fe8::1234:abff:fecd:ef56/64C . fec0::1234:abff:fecd:ef56/64D . fe80::1234:abcd:ef56/64View AnswerAnswer: D

January 24, 2021 No Comments READ MORE +

Which of the following statements would NOT be a proper definition for a Trojan Horse?

Which of the following statements would NOT be a proper definition for a Trojan Horse?A . An authorized program that has been designed to capture keyboard keystroke while the user is unaware of such activity being performedB . An unauthorized program contained within a legitimate program. This unauthorized program performs...

January 24, 2021 No Comments READ MORE +

ping is actually an application developed based on the ______ protocol.

ping is actually an application developed based on the ______ protocol.A . ICMPB . IPC . TCPD . UDPView AnswerAnswer:   A Explanation: The ping function is implemented based on the ICMP protocol: after the source sends an ICMP echo request ( ECHO-REQUEST ) message to the destination, the destination is judged based on whether the destination ICMP echo reply ( ECHO-REPLY ) message is received It is...

January 24, 2021 No Comments READ MORE +

As per the Payment of Gratuity Act, the employer shall pay the amount of gratuity within _________.

As per the Payment of Gratuity Act, the employer shall pay the amount of gratuity within _________.A . 30 daysB . 45 daysC . 180 daysD . 270 daysView AnswerAnswer: A

January 24, 2021 No Comments READ MORE +

The default host name used in Inputs general settings can not be changed.

The default host name used in Inputs general settings can not be changed.A . FalseB . TrueView AnswerAnswer: A

January 24, 2021 No Comments READ MORE +

In which area of the BIG-IP Configuration Utility should the BIG-P Administrator make this change?

The owner of a web application asks the 8IG-IP Administrator to change the port that the BIG-IP device sends traffic to. This change must be made for each member in the server pool named app_pool for their Virtual Server named app_vs. In which area of the BIG-IP Configuration Utility should...

January 24, 2021 No Comments READ MORE +

What is the primary use for the rare command1?

What is the primary use for the rare command1?A . To sort field values in descending orderB . To return only fields containing five or fewer valuesC . To find the least common values of a field in a datasetD . To find the fields with the fewest number of...

January 24, 2021 No Comments READ MORE +