What are two valid live migration scenarios for virtual machines in your environment?

A company named Contoso, Ltd has five Hyper-V hosts that are configured as shown in the following table. What are two valid live migration scenarios for virtual machines in your environment?A . from Sever1 to server5B . from Server4 to Server 5C . from Server2 to Server3D . from Server3...

March 4, 2018 No Comments READ MORE +

What should you do?

You have an Azure subscription that contains a storage account named STOR1 and a container name CONTAINER1. You need to monitor read access for the blobs inside CONTAINER1. The monitoring data must be retained for 10 days. What should you do?A . Run the Set-AzureStorageServiceMetricsProperty cmdlet.B . Run the New-AzureStorageBlobSASToken...

March 3, 2018 No Comments READ MORE +

What should you do?

Your company is launching a public website that allows users to stream videos. You upload multiple video files to an Azure storage container. You need to give anonymous users read access to all of the video files in the storage container. What should you do?A . Edit each blob's metadata...

March 3, 2018 No Comments READ MORE +

Which switch feature determines validity based on IP-to-MAC address bindings that are stored in a trusted database?

Which switch feature determines validity based on IP-to-MAC address bindings that are stored in a trusted database?A . Dynamic ARP InspectionB . storm controlC . VTP pruningD . DHCP snoopingView AnswerAnswer: A Explanation: Dynamic ARP inspection determines the validity of an ARP packet based on valid IP-to-MAC address bindings stored...

March 3, 2018 No Comments READ MORE +

Which statement describes spread spectrum technology in wireless communications?

Which statement describes spread spectrum technology in wireless communications?A . Signal is spread across optical pulses.B . Signal is spread across variations of amplitudes.C . Signal is spread across one frequency.D . Signal is spread across a whole band of frequencies.View AnswerAnswer: D

March 3, 2018 No Comments READ MORE +

Which two BGP attributes can be set with outbound policy to manipulate inbound traffic, if honored by the remote Autonomous system (choose two)?

Which two BGP attributes can be set with outbound policy to manipulate inbound traffic, if honored by the remote Autonomous system (choose two)?A . Multi-exit discriminator (MED)B . AS pathC . Local PreferenceD . WeightView AnswerAnswer: A, B

March 3, 2018 No Comments READ MORE +

VDSL2 on a pair of twisted pair provides vertically symmetrical/asymmetrical transmission rate, transmission distance of about 3km, the maximum descending rate of 52M (symmetric rates), the maximum upstream rate of 12M (asymmetric rate).

VDSL2 on a pair of twisted pair provides vertically symmetrical/asymmetrical transmission rate, transmission distance of about 3km, the maximum descending rate of 52M (symmetric rates), the maximum upstream rate of 12M (asymmetric rate).A . TrueB . FalseView AnswerAnswer: B

March 3, 2018 No Comments READ MORE +

When a STA has authenticated to an AP (AP-1), but still maintains a connection with another AP (AP-2), what is the state of the STA on AP-1?

When a STA has authenticated to an AP (AP-1), but still maintains a connection with another AP (AP-2), what is the state of the STA on AP-1?A . TransitionalB . Unauthenticated and UnassociatedC . Authenticated and UnassociatedD . Authenticated and AssociatedView AnswerAnswer: D

March 3, 2018 No Comments READ MORE +

What is required?

You need to install and configure Connected Field Service. What is required?A . Microsoft Azure Traffic ManagerB . ExpressRouteC . Microsoft Azure Resource GroupD . Content Delivery Network (CDN)View AnswerAnswer: C Explanation: https://docs.microsoft.com/en-us/dynamics365/customer-engagement/field-service/connected-field-service

March 3, 2018 No Comments READ MORE +

Which statement about the configuration of a trunk port as the source of a SPAN session is true?

Which statement about the configuration of a trunk port as the source of a SPAN session is true?A . Only VLANs that are configured individually as SPAN sources are monitoredB . All VLANs in the trunk are monitored.C . The trunk is errdisabled automatically.D . All VLANs in the trunk...

March 3, 2018 No Comments READ MORE +