Which of the following description about the CIFS protocol are correct ? ( multiple choice )

Which of the following description about the CIFS protocol are correct ? ( multiple choice )A . using file record locks, to prevent file or record be covered by other usersB . running on TCP/UDP protocolC . When the client application has recovery connection functions, can automatically restore the connection...

July 6, 2018 No Comments READ MORE +

Which port security mode can assist with troubleshooting by keeping count of violations?

Which port security mode can assist with troubleshooting by keeping count of violations?A . accessB . protectC . restrictD . shutdownView AnswerAnswer: C

July 6, 2018 No Comments READ MORE +

Which tool should you use?

You have a computer named Computer1 that has a 1-TB volume named E. You need to receive a notification when volume E has less than 100 GB of free space. Which tool should you use?A . Event ViewerB . Disk CleanupC . Performance MonitorD . System ConfigurationE . Resource MonitorView...

July 6, 2018 No Comments READ MORE +

Your network contains an Active Directory forest The forest contains two sites named Site1 and Site2

HOTSPOT Your network contains an Active Directory forest The forest contains two sites named Site1 and Site2. Site1 contains 10 domain controllers Site1 and Site2 connect to each other by using a WAN link You run the Active Directory Domain Services Configuration Wizard as shown in the following graphic. Server3...

July 6, 2018 No Comments READ MORE +

What is the result?

A network engineer executes the “ipv6 flowset” command. What is the result?A . Flow-label marking in 1280-byte or larger packets is enabled.B . Flow-set marking in 1280-byte or larger packets is enabledC . IPv6 PMTU is enabled on the router.D . IPv6 flow control is enabled on the router.View AnswerAnswer:...

July 6, 2018 No Comments READ MORE +

What is the result of enabling the command?

Within the vPC configuration of the 7K's, the command peer switch is configured. What is the result of enabling the command?A . Both vPC peers use the same STP root IC . The Vpc primary switch (7k-4 in this case) also serves as the STP root to improve vPC convergence.D...

July 6, 2018 No Comments READ MORE +

Amazon 53 doesn't automatically give a user who creates __ permission to perform other actions on that bucket or object.

Amazon 53 doesn't automatically give a user who creates __ permission to perform other actions on that bucket or object.A . a fileB . a bucket or objectC . a bucket or fileD . a object or fileView AnswerAnswer: B

July 6, 2018 No Comments READ MORE +

Email spoofing refers to:

Email spoofing refers to:A . The forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual sourceB . The criminal act of sending an illegitimate email, falsely claiming to be from a legitimate site in an attempt to acquire...

July 6, 2018 No Comments READ MORE +

Which option is expected outcome on the configured switch?

Refer to the exhibit. Which option is expected outcome on the configured switch?A . The switch enforces SNMP message encryption for all usersB . The switch responds with an authorization error for any SNMPv3 PDU requests that use a security level parameter of anthnopriv.C . SNMP requires encryption for all...

July 6, 2018 No Comments READ MORE +

Which command configures console port authorization under line con 0?

Which command configures console port authorization under line con 0?A . authorization default|WORDB . authorization exec line con 0|WORDC . authorization line con 0|WORDD . authorization exec default|WORDView AnswerAnswer: D

July 6, 2018 No Comments READ MORE +