Which subnet should you use?

Your company owns the public Internet IP address range of 131.107.20.0 to 131.107.20.255. You need to create a subnet that supports four hosts. The solution must minimize the number of addresses available to the subnet. Which subnet should you use?A . 131.107.20.16/28B . 131.107.20.16/30C . 131.107.20.0/29D . 131.107.20.0 with subnet...

September 23, 2020 No Comments READ MORE +

You have an Azure subscription named Subscription1.

You have an Azure subscription named Subscription1. Subscription1 contains the virtual machines in the following table. Subscription1 contains a virtual network named VNet1 that has the subnets in the following table. VM3 has a network adapter named NIC3. IP forwarding is enabled on NIC3. Routing is enabled on VM3. You...

September 23, 2020 No Comments READ MORE +

Which design element is a best practice when deploying an 802.11b wireless infrastructure?

Which design element is a best practice when deploying an 802.11b wireless infrastructure?A . disabling TPC so that access points can negotiate signal levels with their attached wireless devices.B . setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN ControllerC . allocating non overlapping channels to...

September 23, 2020 No Comments READ MORE +

Which two cmdlets should you use?

Your network contains an Active directory forest named contoso.com. The forest has a Distributed File System (DFS) namespace named \contoso.comnamespace1. The domain contains a file server named Server1 that runs Windows Server 2016. You create a folder named Folder1 on Server1. You need to use Folder1 as a target for...

September 23, 2020 No Comments READ MORE +

Which of the below scanning technique will you use?

You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for. Which of the below scanning technique will you use?A...

September 23, 2020 No Comments READ MORE +

To minimize adverse impacts on business operations

To minimize adverse impacts on business operationsA . 1 and 2 onlyB . 2 and 3 onlyC . 1 and 3 onlyD . All of the aboveView AnswerAnswer: B

September 23, 2020 No Comments READ MORE +

Which solution meets these requirements?

A company is planning to do a proof of concept for a machine earning (ML) project using Amazon SageMaker with a subset of existing on-premises data hosted in the company’s 3 TB data warehouse. For part of the project, AWS Direct Connect is established and tested. To prepare the data...

September 23, 2020 No Comments READ MORE +

Which one of the following statements best describes the gap analysis technique?

Gap Analysis is a technique used in Phases B, C, D and E. Which one of the following statements best describes the gap analysis technique?A . It highlights areas of stakeholder concernB . It highlights the impacts of changeC . It highlights services that are yet to be developedD ....

September 23, 2020 No Comments READ MORE +

What is described by the service value system?

What is described by the service value system?A . How all the components and activities of the organization work together as a system to enable value creationB . Services based on one or more products, designed to address needs of a target consumer groupC . Joint activities performed by a...

September 23, 2020 No Comments READ MORE +

How should you complete the command?

HOTSPOT You need to create an Azure key vault. The solution must ensure that any object deleted from the key vault be retained for 90 days. How should you complete the command? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point....

September 23, 2020 No Comments READ MORE +