Which three storage types will achieve the goal?

You administer an Azure subscription for your company. You have an application that updates text files frequently. The text files will not exceed 20 gigabytes (GB) in size. Each write operation must not exceed 4 megabytes (MB). You need to allocate storage in Azure for the application. Which three storage...

June 29, 2018 No Comments READ MORE +

When using WPAD DNS method, what is the FQDN format that browsers use to query the DNS server?

When using WPAD DNS method, what is the FQDN format that browsers use to query the DNS server?A . wpad.<local-domain>B . srv_tcp.wpad.<local-domain>C . srv_proxy.<local-domain>/wpad.datD . proxy.<local-domain>.wpadView AnswerAnswer: A

June 29, 2018 No Comments READ MORE +

TTL is mainly to prevent IP packet loop forwarding in the network, wasting network bandwidth.

TTL is mainly to prevent IP packet loop forwarding in the network, wasting network bandwidth.A . TrueB . FalseView AnswerAnswer: A

June 29, 2018 No Comments READ MORE +

Which application can be used to show available resources in an IP500 V2?

Which application can be used to show available resources in an IP500 V2?A . DbgViewB . IP Office ManagerC . MonitorD . System Status ApplicationView AnswerAnswer: D

June 29, 2018 No Comments READ MORE +

Which capability is provided by a software-defined storage controller?

Which capability is provided by a software-defined storage controller?A . Ability to pool and abstract physical storage and present it as an open storage platformB . Ability for multiple operating systems to run concurrently on a single physical compute systemC . Mechanisms to automatically create application programming interfaces for centralized...

June 29, 2018 No Comments READ MORE +

Which two statements about the MACsec security protocol are true? (Choose two.)

Which two statements about the MACsec security protocol are true? (Choose two.)A . Stations broadcast an MKA heartbeat that contains the key server priority.B . MACsec is not supported in MDA mode.C . When switch-to-swltch link security is configured In manual mode, the SAP operation mode must be set to...

June 29, 2018 No Comments READ MORE +

What to configure in BGP so that other BGP neighbours cannot influence the path of a route.

What to configure in BGP so that other BGP neighbours cannot influence the path of a route.A . Lower MEDB . Higher Local PreferenceC . Higher WeightD . Lower Router IDView AnswerAnswer: C Explanation: The BGP golden rule is that nobody can say me what is have to do with...

June 28, 2018 No Comments READ MORE +

Which two considerations must be taken into account before configuring Auto Deploy?

An administrator has decided to use Auto Deploy in the environment. Which two considerations must be taken into account before configuring Auto Deploy? (Choose two.)A . Hosts in a cluster must be connected to a Distributed Switch.B . Host profiles are not supported when using Auto Deploy.C . DHCP must...

June 28, 2018 No Comments READ MORE +

Which of the below is not an Amazon EMR cluster state?

You have just finshed setting up an advertisement server in which one of the obvious choices for a service was Amazon Elastic Map Reduce( EMR) and are now troubleshooting some weird cluster states that you are seeing. Which of the below is not an Amazon EMR cluster state?A .  STARTINGB .  STOPPEDC...

June 28, 2018 No Comments READ MORE +

Which of the following is a serious vulnerability in the popular OpenSSL cryptographic software library? This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.

Which of the following is a serious vulnerability in the popular OpenSSL cryptographic software library? This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.A . SSL/TLS Renegotiation VulnerabilityB . ShellshockC . Heartbleed BugD . POODLEView AnswerAnswer: C

June 28, 2018 No Comments READ MORE +