Which action allows a network engineer to limit a default VLAN from being propagated across all trunks?

Which action allows a network engineer to limit a default VLAN from being propagated across all trunks?A . Upgrade to VTP version 3 for advanced feature set support.B . Enable VTP pruning on the VTP server.C . Manually prune default VLAN with switchport trunk allowed vlans remove.D . Use trunk...

August 3, 2018 No Comments READ MORE +

Which of the following designs will meet these objectives'?

You have been asked to design the storage layer for an application. The application requires disk performance of at least 100,000 lOPS in addition, the storage layer must be able to survive the loss ofan individual disk. EC2 instance, or Availability Zone without any data loss. The volume you provide must have a capacity...

August 3, 2018 No Comments READ MORE +

What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the DNS Server role installed. The network contains client computers that run either Linux, Windows 7, or Windows 8. You have a zone named adatum.com...

August 3, 2018 No Comments READ MORE +

Which port is the default port for SCCP call signaling on Cisco Unified Communications Manager?

Which port is the default port for SCCP call signaling on Cisco Unified Communications Manager?A . 2000B . 2443C . 5060D . 5061View AnswerAnswer: A

August 3, 2018 No Comments READ MORE +

Which PHP function is used to validate whether the contents of $_FILES['name']['tmp_name'] have really been uploaded via HTIP?

Which PHP function is used to validate whether the contents of $_FILES['name']['tmp_name'] have really been uploaded via HTIP?View AnswerAnswer: is_uploaded_file(), is_uploaded_file

August 3, 2018 No Comments READ MORE +

Which two fields are characteristics of IEEE 802.1AE frame? (Choose two.)

Which two fields are characteristics of IEEE 802.1AE frame? (Choose two.)A . destination MAC addressB . source MAC addressC . 802.1AE header in EtherTypeD . security group tag in EtherTypeE . integrity check valueF . CRC/FCSView AnswerAnswer: C,E

August 3, 2018 No Comments READ MORE +

Which solution should you use?

You are a database administrator for a Microsoft SQL Server 2012 instance. You need to ensure that data can be replicated from a production server to two reporting servers in real time. You also need to ensure that data on the reporting server is always accessible. Which solution should you...

August 3, 2018 No Comments READ MORE +

Which solution should you recommend?

You are the Office 365 Administrator for your company. You plan to implement a collaboration platform for a company. All 1,000 employees currently use Excel 2010. You have the following requirements: -All employees must be able to co-author Excel workbooks. -You must minimize the costs associated with any solution. You...

August 3, 2018 No Comments READ MORE +

A network engineer is asked to configure NetFlow to sample one of every 100 packets on a router's fa0/0 interface. Which configuration enables sampling, assuming that NetFlow is already configured and running on the router's fa0/0 interface?

A network engineer is asked to configure NetFlow to sample one of every 100 packets on a router's fa0/0 interface. Which configuration enables sampling, assuming that NetFlow is already configured and running on the router's fa0/0 interface?A . flow-sampler-map flow1mode random one-out-of 100 interface fas0/0 flow-sampler flow1B . flow monitor...

August 3, 2018 No Comments READ MORE +