Which function is a responsibility of the business architect?

Which function is a responsibility of the business architect?A . Provide product demonstrations/presentations.B . Configure technology solutions.C . Understand customer business priorities.D . Provide product specific technical support.View AnswerAnswer: C

March 11, 2018 No Comments READ MORE +

Can I move a Reserved Instance from one Region to another?

Can I move a Reserved Instance from one Region to another?A . NoB . Only if they are moving into GovCloudC . YesD . Only if they are moving to US East from another regionView AnswerAnswer: A

March 11, 2018 No Comments READ MORE +

What is the advantage of using a multipoint interface instead of point-to-point subinterfaces when configuring a Frame Relay hub in a hub-and-spoke topology?

What is the advantage of using a multipoint interface instead of point-to-point subinterfaces when configuring a Frame Relay hub in a hub-and-spoke topology?A . It avoids split-horizon issues with distance vector routing protocols.B . IP addresses can be conserved if VLSM is not being used for subnetting.C . A multipoint...

March 11, 2018 No Comments READ MORE +

Which command can be used to block a frame with an unknown destination MAC address from being forwarded out of an interface?

Which command can be used to block a frame with an unknown destination MAC address from being forwarded out of an interface?A . switchport protectedB . It is not forwarded if the destination MAC address is unknownC . switchport port-fastD . switchport block unicastView AnswerAnswer: A

March 11, 2018 No Comments READ MORE +

Which operating mode is valid for controllers in a converged access architecture?

Which operating mode is valid for controllers in a converged access architecture?A . switch peer groupsB . mobility controllerC . auto-anchorD . foreign anchorView AnswerAnswer: B

March 10, 2018 No Comments READ MORE +

What should you recommend?

You need to recommend the appropriate strategy for the data mining application. What should you recommend?A . Configure multiple on-premises cluster that runs multiple Azure virtual machines to connect by using an Azure virtual private network (VPN).B . Configure an on-premises cluster that runs multiple Azure virtual machines that is...

March 10, 2018 No Comments READ MORE +

What should you recommend?

Topic 7, Mix Questions You are designing an Azure web application. The solution will be used by multiple customers. Each customer has different business logic and user interface requirements. Not all customers use the same version of the.NET runtime. You need to recommend a deployment strategy. What should you recommend?A...

March 10, 2018 No Comments READ MORE +

Which two statements about the SeND protocol are true? (Choose two)

Which two statements about the SeND protocol are true? (Choose two)A . It counters neighbor discovery threats.B . It must be enabled before you can configure IPv6 addresses.C . It supports numerous custom neighbor discovery messages.D . it logs IPv6-related threats to an external log server.E . It supports an...

March 10, 2018 No Comments READ MORE +

In which three situations is correspondent banking most vulnerable to money laundering? Choose 3 answers

In which three situations is correspondent banking most vulnerable to money laundering? Choose 3 answersA . When allowing foreign banks to use the correspondent account to conduct large financial transactions on behalf of their customersB . When allowing the correspondent bank account to be used as a payable through account...

March 10, 2018 No Comments READ MORE +

Which two NAC agents support file remediation? (Choose two.)

Which two NAC agents support file remediation? (Choose two.)A . Web Agent for MacintoshB . NAC Agent for WindowsC . NAC Agent for MacintoshD . Web Agent for UNIXE . Web Agent for WindowsView AnswerAnswer: B, E

March 10, 2018 No Comments READ MORE +