What should you modify?
A user named User1 has a computer that runs Windows 10. User1 reports that Cortana displays news topics that the user wants to suppress. You need to suppress the news topics from being displayed. What should you modify?A . RemindersB . the LocationsettingsC . the News app settingsD . NotebookView...
What are two possible ways to achieve this goal?
You manage a cloud service that hosts a customer-facing application. The application allows users to upload images and create collages. The cloud service is running in two medium instances and utilizes Azure Queue storage for image processing. The storage account is configured to be locally redundant. The sales department plans...
What should you do?
You are the Office 365 administrator for your company. Many employees work in remote locations with intermittent Internet connectivity. Employees must be able to access and reply to email messages, and access calendars, even when their devices are not connected to the Internet. You need to ensure that employees can...
What role will the administrator assign to the user?
A network administrator is creating an ASA-CX administrative user account with the following parameters: -The user will be responsible for configuring security policies on networkdevices. -The user needs read-write access to policies. -The account has no more rights than necessary for the job. What role will the administrator assign to...
How would you do this while minimizing costs?
Your company currently has a 2-tier web application running in an on-premises data center. You have experienced several infrastructure failures in the past two months resulting in significant financial losses. Your CIO is strongly agreeing to move the application to AWS. While working on achieving buy-in from the other company executives, he asks you...
Which IPS mode is less secure than other options but allows optimal network throughput?
Which IPS mode is less secure than other options but allows optimal network throughput?A . Promiscuous modeB . inline modeC . transparent modeD . inline-bypass modeView AnswerAnswer: A Explanation: The recommended IPS deployment mode depends on the goals and policies of the enterprise. IPS inline mode is more secure because...
Centralized logging is defined as gathering the computer system logs for a group of systems in a centralized location. It is used to efficiently monitor computer system logs with the frequency required to detect security violations and unusual activity.
Centralized logging is defined as gathering the computer system logs for a group of systems in a centralized location. It is used to efficiently monitor computer system logs with the frequency required to detect security violations and unusual activity.A . TrueB . FalseView AnswerAnswer: A
Which layer serves as the boundary between L2 and L3 links in a datacenter infrastructure?
Which layer serves as the boundary between L2 and L3 links in a datacenter infrastructure?A . Access LayerB . Core LayerC . Aggregation LayerD . None of aboveView AnswerAnswer: C
In addition to an S822L, what is a component of the IBM solution for Hadoop?
In addition to an S822L, what is a component of the IBM solution for Hadoop?A . Flash System 840B . DS870C . ESSD . DCS3700View AnswerAnswer: A
Which part of the PPPoE server configuration contains the information used to assign an IP address to a PPPoE client?
Which part of the PPPoE server configuration contains the information used to assign an IP address to a PPPoE client?A . virtual-template interfaceB . DHCPC . dialer interfaceD . AAA authenticationView AnswerAnswer: A