Which of the following are true for reports in ServiceNow?(Choose three.)

Which of the following are true for reports in ServiceNow?(Choose three.)A . Any user can see any report shared with them.B . Can be a graphical representation of data.C . All users can generate reports on any table.D . Can be run on demand by authorized users.E . Can be...

September 24, 2020 No Comments READ MORE +

How does the Monitoring Console monitor forwarders?

How does the Monitoring Console monitor forwarders?A . By pulling internal logs from forwarders.B . By using the forwarder monitoring add-on.C . With internal logs forwarded by forwarders.D . With internal logs forwarded by deployment server.View AnswerAnswer: A

September 24, 2020 No Comments READ MORE +

Which Boolean operator is always implied between two search terms, unless otherwise specified?

Which Boolean operator is always implied between two search terms, unless otherwise specified?A . ORB . NOTC . ANDD . XORView AnswerAnswer: C Explanation: Reference: https://docs.splunk.com/Documentation/Splunk/7.2.6/Search/Booleanexpressions

September 24, 2020 No Comments READ MORE +

If a group of routers are running VRRP with a virtual router ID of 155, which MAC address will be used to respond to the ARP requests for the virtual IP?

If a group of routers are running VRRP with a virtual router ID of 155, which MAC address will be used to respond to the ARP requests for the virtual IP?A . 0000-5E00-0155B . 0000-5E00-019BC . 0001-5500-005ED . 0001-9B00-005EView AnswerAnswer: B

September 24, 2020 No Comments READ MORE +

How should you configure the schedule?

Hotspot Question A company uses Dynamics 365 for Sales. You need to reduce the number of pre-sales support days that are available based on the days the company is closed for public holidays. How should you configure the schedule? To answer, select the appropriate options in the answer area. View...

September 24, 2020 No Comments READ MORE +

What is the main security service a cryptographic hash provides?

What is the main security service a cryptographic hash provides?A . Integrity and ease of computationB . Message authentication and collision resistanceC . Integrity and collision resistanceD . Integrity and computational in-feasibilityView AnswerAnswer: D

September 24, 2020 No Comments READ MORE +

Which JSON syntax is valid?

Which JSON syntax is valid?A . {“switch”: “name”: “dist1”, “interfaces”: [“gig1”, “gig2”, “gig3”]}B . {/“switch/”: {/“name/”: “dist1”, /“interfaces/”: [“gig1”, “gig2”, “gig3”]}}C . {“switch”: {“name”: “dist1”, “interfaces”: [“gig1”, “gig2”, “gig3”]}}D . {‘switch’: (‘name’: ‘dist1’, ‘interfaces’: [‘gig1’, ‘gig2’, ‘gig3’])}View AnswerAnswer: A

September 24, 2020 1 Comment READ MORE +

What should you do?

You need to ensure that users can access VM0. The solution must meet the platform protection requirements. What should you do?A . Move VM0 to Subnet1.B . On Firewall, configure a network traffic filtering rule.C . Assign RT1 to AzureFirewallSubnet.D . On Firewall, configure a DNAT rule.View AnswerAnswer: A Explanation:...

September 24, 2020 No Comments READ MORE +

Which task should an administrator perform to troubleshoot operation of the Symantec Endpoint Protection embedded database?

Which task should an administrator perform to troubleshoot operation of the Symantec Endpoint Protection embedded database?A . verify that dbsrv11.exe is listening on port 2638B . check whether the MSSQLSERVER service is runningC . verify the sqlserver.exe service is running on port 1433D . check the database transaction logs in...

September 24, 2020 No Comments READ MORE +

What is the expected output of the following snippet?

What is the expected output of the following snippet? A . the code is erroneousB . 3C . 7D . 15View AnswerAnswer: A

September 23, 2020 No Comments READ MORE +