Which function is a responsibility of the business architect?
Which function is a responsibility of the business architect?A . Provide product demonstrations/presentations.B . Configure technology solutions.C . Understand customer business priorities.D . Provide product specific technical support.View AnswerAnswer: C
Can I move a Reserved Instance from one Region to another?
Can I move a Reserved Instance from one Region to another?A . NoB . Only if they are moving into GovCloudC . YesD . Only if they are moving to US East from another regionView AnswerAnswer: A
What is the advantage of using a multipoint interface instead of point-to-point subinterfaces when configuring a Frame Relay hub in a hub-and-spoke topology?
What is the advantage of using a multipoint interface instead of point-to-point subinterfaces when configuring a Frame Relay hub in a hub-and-spoke topology?A . It avoids split-horizon issues with distance vector routing protocols.B . IP addresses can be conserved if VLSM is not being used for subnetting.C . A multipoint...
Which command can be used to block a frame with an unknown destination MAC address from being forwarded out of an interface?
Which command can be used to block a frame with an unknown destination MAC address from being forwarded out of an interface?A . switchport protectedB . It is not forwarded if the destination MAC address is unknownC . switchport port-fastD . switchport block unicastView AnswerAnswer: A
Which operating mode is valid for controllers in a converged access architecture?
Which operating mode is valid for controllers in a converged access architecture?A . switch peer groupsB . mobility controllerC . auto-anchorD . foreign anchorView AnswerAnswer: B
What should you recommend?
You need to recommend the appropriate strategy for the data mining application. What should you recommend?A . Configure multiple on-premises cluster that runs multiple Azure virtual machines to connect by using an Azure virtual private network (VPN).B . Configure an on-premises cluster that runs multiple Azure virtual machines that is...
What should you recommend?
Topic 7, Mix Questions You are designing an Azure web application. The solution will be used by multiple customers. Each customer has different business logic and user interface requirements. Not all customers use the same version of the.NET runtime. You need to recommend a deployment strategy. What should you recommend?A...
Which two statements about the SeND protocol are true? (Choose two)
Which two statements about the SeND protocol are true? (Choose two)A . It counters neighbor discovery threats.B . It must be enabled before you can configure IPv6 addresses.C . It supports numerous custom neighbor discovery messages.D . it logs IPv6-related threats to an external log server.E . It supports an...
In which three situations is correspondent banking most vulnerable to money laundering? Choose 3 answers
In which three situations is correspondent banking most vulnerable to money laundering? Choose 3 answersA . When allowing foreign banks to use the correspondent account to conduct large financial transactions on behalf of their customersB . When allowing the correspondent bank account to be used as a payable through account...
Which two NAC agents support file remediation? (Choose two.)
Which two NAC agents support file remediation? (Choose two.)A . Web Agent for MacintoshB . NAC Agent for WindowsC . NAC Agent for MacintoshD . Web Agent for UNIXE . Web Agent for WindowsView AnswerAnswer: B, E