Fill in the blank with the appropriate term. The ______________is a communication protocol that communicates information between the network routers and the multicast end stations

FILL BLANK Fill in the blank with the appropriate term. The ______________is a communication protocol that communicates information between the network routers and the multicast end stations.View AnswerAnswer: IGMP Explanation: The Internet Group Management Protocol (IGMP) is a communication protocol that communicates information between the network routers and the multicast...

September 18, 2020 No Comments READ MORE +

Which A records will be added to the adatum.com zone for each virtual machine?

You have Azure virtual machines that run Windows Server 2019 and are configured as shown in the following table. You create a private Azure DNS zone named adatum.com. You configure the adatum.com zone to allow auto registration from VNET1. Which A records will be added to the adatum.com zone for...

September 18, 2020 No Comments READ MORE +

Which two parameters can have a negative effect on the Wi-Fi coverage of an access point?

A wireless engineer is designing a wireless network for a campus. Which two parameters can have a negative effect on the Wi-Fi coverage of an access point? (Choose two.)A . authentication usedB . surrounding areaC . wireless channelsD . wireless encryptionE . type of the antenna usedView AnswerAnswer: BC

September 18, 2020 No Comments READ MORE +

From which hosts will Computer1 download updates?

Your network contains an Active Directory forest. The forest contains a single domain and three sites named Site1, Site2, and Site3. Each site is associated to two subnets. Site1 contains two subnets named SubnetA and SubnetB. All the client computers in the forest run Windows 10. Delivery Optimization is enabled....

September 18, 2020 No Comments READ MORE +

What should you do on each server?

HOTSPOT Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2016. Server1 has Microsoft System Center 2016 Virtual Machine Manager (VMM) installed. Server2 has IP Address Management (IPAM) installed. You create a domain user named User1. You...

September 18, 2020 No Comments READ MORE +

Which of the following requirements would best fit under the objective, "Implement strong access control measures"?

The Payment Card Industry Data Security Standard (PCI DSS) contains six different categories of control objectives. Each objective contains one or more requirements, which must be followed in order to achieve compliance. Which of the following requirements would best fit under the objective, "Implement strong access control measures"?A . Regularly...

September 18, 2020 No Comments READ MORE +

This proves that CompanyXYZ’s email gateway doesn’t prevent what?

CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware of your test. Your email message looks...

September 18, 2020 No Comments READ MORE +

What should you use?

You plan to deploy Azure IoT Edge devices that will each store more than 10,000 images locally and classify the images by using a Custom Vision Service classifier. Each image is approximately 5 MB. You need to ensure that the images persist on the devices for 14 days. What should...

September 18, 2020 No Comments READ MORE +

Which IPv6 address type provides communication between subnets and cannot route on the Internet?

Which IPv6 address type provides communication between subnets and cannot route on the Internet?A . link-localB . unique localC . multicastD . global unicastView AnswerAnswer: B

September 18, 2020 No Comments READ MORE +

Which type of virus detection method did Chandler use in this context?

Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities. Which type of virus detection method did Chandler...

September 18, 2020 No Comments READ MORE +