What should you modify?

A user named User1 has a computer that runs Windows 10. User1 reports that Cortana displays news topics that the user wants to suppress. You need to suppress the news topics from being displayed. What should you modify?A . RemindersB . the LocationsettingsC . the News app settingsD . NotebookView...

June 21, 2018 No Comments READ MORE +

What are two possible ways to achieve this goal?

You manage a cloud service that hosts a customer-facing application. The application allows users to upload images and create collages. The cloud service is running in two medium instances and utilizes Azure Queue storage for image processing. The storage account is configured to be locally redundant. The sales department plans...

June 21, 2018 No Comments READ MORE +

What should you do?

You are the Office 365 administrator for your company. Many employees work in remote locations with intermittent Internet connectivity. Employees must be able to access and reply to email messages, and access calendars, even when their devices are not connected to the Internet. You need to ensure that employees can...

June 21, 2018 No Comments READ MORE +

What role will the administrator assign to the user?

A network administrator is creating an ASA-CX administrative user account with the following parameters: -The user will be responsible for configuring security policies on networkdevices. -The user needs read-write access to policies. -The account has no more rights than necessary for the job. What role will the administrator assign to...

June 21, 2018 No Comments READ MORE +

How would you do this while minimizing costs?

Your company currently has a 2-tier web application running in an on-premises data center. You have experienced several infrastructure failures in the past two months resulting in significant financial losses. Your CIO is strongly agreeing to move the application to AWS. While working on achieving buy-in from the other company executives, he asks you...

June 21, 2018 No Comments READ MORE +

Which IPS mode is less secure than other options but allows optimal network throughput?

Which IPS mode is less secure than other options but allows optimal network throughput?A . Promiscuous modeB . inline modeC . transparent modeD . inline-bypass modeView AnswerAnswer: A Explanation: The recommended IPS deployment mode depends on the goals and policies of the enterprise. IPS inline mode is more secure because...

June 21, 2018 No Comments READ MORE +

Centralized logging is defined as gathering the computer system logs for a group of systems in a centralized location. It is used to efficiently monitor computer system logs with the frequency required to detect security violations and unusual activity.

Centralized logging is defined as gathering the computer system logs for a group of systems in a centralized location. It is used to efficiently monitor computer system logs with the frequency required to detect security violations and unusual activity.A . TrueB . FalseView AnswerAnswer: A

June 21, 2018 No Comments READ MORE +

Which layer serves as the boundary between L2 and L3 links in a datacenter infrastructure?

Which layer serves as the boundary between L2 and L3 links in a datacenter infrastructure?A . Access LayerB . Core LayerC . Aggregation LayerD . None of aboveView AnswerAnswer: C

June 21, 2018 No Comments READ MORE +

In addition to an S822L, what is a component of the IBM solution for Hadoop?

In addition to an S822L, what is a component of the IBM solution for Hadoop?A . Flash System 840B . DS870C . ESSD . DCS3700View AnswerAnswer: A

June 21, 2018 No Comments READ MORE +

Which part of the PPPoE server configuration contains the information used to assign an IP address to a PPPoE client?

Which part of the PPPoE server configuration contains the information used to assign an IP address to a PPPoE client?A . virtual-template interfaceB . DHCPC . dialer interfaceD . AAA authenticationView AnswerAnswer: A

June 21, 2018 No Comments READ MORE +