Which two correctly describe steps in the OSI data encapsulation process? (Choose two.)

Which two correctly describe steps in the OSI data encapsulation process? (Choose two.)A . The transport layer divides a data stream into segments and may add reliability and flow control information.B . The data link layer adds physical source and destination addresses and an FCS to the segment.C . Packets...

July 3, 2018 No Comments READ MORE +

How should you create and configure the WebJob object?

HOTSPOT You have an Azure website that runs on several instances. You have a WebJob that provides additional functionality to the website. The WebJob must run on all instances of the website. You need to ensure that the WebJob runs even when the website is idle for long periods of...

July 3, 2018 No Comments READ MORE +

In which section of the TOGAF template for Architecture Principles would a reader find the answer to the of 'How does this affect me"?

In which section of the TOGAF template for Architecture Principles would a reader find the answer to the of 'How does this affect me"?A . ImplicationsB . NameC . RationaleD . StatementView AnswerAnswer: A

July 3, 2018 No Comments READ MORE +

How can this be accomplished in the shortest amount of time?

An administrator has recently installed a new ESXi 6.x Host, and during the configuration notices sporadic network problems. To check whether the issue occurred sometime during the configuration, the administrator would like to reset the system. How can this be accomplished in the shortest amount of time?A . Run the...

July 3, 2018 No Comments READ MORE +

What can you determine based on this information?

An organization decides to implement NetFlow on its network to monitor the fluctuation of traffic that is disrupting core services. After reviewing the output of NetFlow, the network engineer is unable to see OUT traffic on the interfaces. What can you determine based on this information?A . Cisco Express Forwarding...

July 3, 2018 No Comments READ MORE +

Which switch provides the spanning-tree designated port role for the network segment that services the printers?

Refer to the exhibit. Which switch provides the spanning-tree designated port role for the network segment that services the printers?A . Switch1B . Switch2C . Switch3D . Switch4View AnswerAnswer: C Explanation: First, the question asks what switch services the printers, so it can be Switch 3 or Switch 4 which...

July 3, 2018 No Comments READ MORE +

Which three pieces of information are displayed in the output?

A network engineer executes the show crypto ipsec sa command. Which three pieces of information are displayed in the output? (Choose three.)A . inbound crypto mapB . remaining key lifetimeC . path MTUD . tagged packetsE . untagged packetsF . invalid identity packetsView AnswerAnswer: ABC Explanation: This command shows IPsec...

July 3, 2018 No Comments READ MORE +

What are three of the RBAC views within Cisco IOS Software? (Choose three.)

What are three of the RBAC views within Cisco IOS Software? (Choose three.)A . AdminB . CLIC . RootD . Super AdminE . GuestF . SuperView AnswerAnswer: B,C,F

July 3, 2018 No Comments READ MORE +

What are the metric values of the confidentiality based on the CVSS framework?

What are the metric values of the confidentiality based on the CVSS framework?A . Low-highB . Low CMedium-highC . High-Low-noneView AnswerAnswer: C

July 3, 2018 No Comments READ MORE +