When considering the three VoIP design models - single site, centralized multisite, and distributed multisite - which question below would help to eliminate one of the options?
When considering the three VoIP design models - single site, centralized multisite, and distributed multisite - which question below would help to eliminate one of the options?A . Will the switches be required to provide inline power?B . Will users need to make offsite calls, beyond the enterprise?C . Will...
What should you modify?
You have a Hyper-V host named Hyper1 that has Windows Server 2012 installed. Hyper1 hosts 20 virtual machines. Hyper1 has one physical network adapter. You need to implement a networking solution that evenly distributes the available bandwidth on Hyper1 to all of the virtual machines. What should you modify?A ....
which term best describes the concept of preventing the modification of data in transit and in storage?
which term best describes the concept of preventing the modification of data in transit and in storage?A . ConfidentialityB . IntegrityC . AvailabilityD . fidelityView AnswerAnswer: B Explanation: Integrity for data means that changes made to data are done only by authorized individuals/systems. Corruption of data is a failure to...
Which type of attack is directed against the network directly:
Which type of attack is directed against the network directly:A . Denial of ServiceB . phishingC . trojan horseView AnswerAnswer: A
Which certificate should you identify?
Your network contains an Active Directory domain named contoso.com. Your company has an enterprise root certification authority (CA) named CA1. You plan to deploy Active Directory Federation Services (AD FS) to a server named Server1. The company purchases a Microsoft Office 365 subscription. You plan to register the company's SMTP...
Which two useful pieces of information can be collected from the IPv4 protocol header? (Choose two.)
Which two useful pieces of information can be collected from the IPv4 protocol header? (Choose two.)A . UDP port which the traffic is destinedB . source IP address of the packetC . UDP port from which the traffic is sourcedD . TCP port from which the traffic was sourceE ....
What should you do?
A database named DB2 uses the InMemory query mode. Users frequently run the following query: You need to ensure no users see the PriorYearSales measure in the field list for the Sales table. What should you do?A . Create a perspective, and ensure that the PriorYearSales measure is not added...
In an AS with 10 routers running IBGP, how many IBGP sessions will be required to establish fully meshed IBGP peerings?
In an AS with 10 routers running IBGP, how many IBGP sessions will be required to establish fully meshed IBGP peerings?A . 10B . 20C . 45D . 50E . 99F . 100View AnswerAnswer: C
Which option will reduce load on the Amazon EC2 instance?
You have a content management system running on an Amazon EC2 instance that is approaching 100% CPU utilization. Which option will reduce load on the Amazon EC2 instance?A . Create a load balancer, and register the Amazon EC2 instance with itB . Create a Cloud Front distribution, and configure the Amazon EC2...
How long is the default keepalive period for SRST in Cisco IOS?
How long is the default keepalive period for SRST in Cisco IOS?A . 45 secB . 30 secC . 60 secD . 120 secView AnswerAnswer: B