Which Power Shell cmdlets should you use?

DRAG DROP You administer an Azure Virtual Machine (VM) named server1. The VM is in a cloud service named ContosoService1. You discover that the VM is experiencing storage issues due to increased application logging on the server. You need to create a new 256-GB disk and attach it to the...

February 13, 2018 No Comments READ MORE +

• What’s the person name whose password is solicitous?

CORRECT TEXT RHCE Test Configuration Instructions Information for the two systems you will use in test is the following: system1.group3.example.com: is one of the main sever. system2.group3.example.com: mainly used as a client. Password for both of the two systems is atenorth System’s IP is provided by DHCP, you can regard...

February 13, 2018 No Comments READ MORE +

Which software platform allows you to make this migration?

You have an organization that has a growing number of standalone APs. You would like to migrate to lightweight APs and manage them through Cisco WCS. Which software platform allows you to make this migration?A . The enterprise version of Cisco WCS allows this migration and provides the most flexibility...

February 12, 2018 No Comments READ MORE +

When designing layer 2 STP based LAN with FHRP, what design recommendation should be followed?

When designing layer 2 STP based LAN with FHRP, what design recommendation should be followed?A . Assign STP root with active FHRP deviceB . Assign native VLAN to lowest number in useC . Avoid configuring router preemptD . Avoid modifying STP & FHRP default timersView AnswerAnswer: A

February 12, 2018 No Comments READ MORE +

What are the two types of address translation rules?

What are the two types of address translation rules?A . Translated packet and untranslated packetB . Untranslated packet and manipulated packetC . Manipulated packet and original packetD . Original packet and translated packetView AnswerAnswer: D Explanation: NAT Rule Base The NAT Rule Base has two sections that specify how the...

February 12, 2018 No Comments READ MORE +

Which of the following encrypts the traffic on a leased line?

Which of the following encrypts the traffic on a leased line?A . telnetB . sshC . vtpD . vpnE . dmvpnView AnswerAnswer: B

February 12, 2018 No Comments READ MORE +

Which two external authentication servers are supported for administrative access to a Junos device? (Choose two.)

Which two external authentication servers are supported for administrative access to a Junos device? (Choose two.)A . RADIUSB . LDAPC . ACED . TACACS+View AnswerAnswer: A, D

February 12, 2018 No Comments READ MORE +

Which two statements about GETVPN are true? (Choose two)

Which two statements about GETVPN are true? (Choose two)A . It supports non-IP protocolsB . It is supported on MPLS networksC . It uses stateless failover for high availabilityD . It can use GRE or DMVPN to support private IP addressingE . It supports only hub-spoke topologiesView AnswerAnswer: A,B

February 12, 2018 1 Comment READ MORE +

How many bytes are added to each frame as a result of the configuration?

Refer to the exhibit. How many bytes are added to each frame as a result of the configuration?A . 4-bytes except the native VLANB . 8-bytes except the native VLANC . 4-bytes including native VLAND . 8-bytes including native VLANView AnswerAnswer: A Explanation: In 802.1Q trunking, all VLAN packets are...

February 12, 2018 No Comments READ MORE +

Which of the following RAS features was added to the POWER8 design?

Which of the following RAS features was added to the POWER8 design?A . Processor AffinityB . First Failure Data CaptureC . Error Correction Codes (ECC)D . Memory Controller Replay BufferView AnswerAnswer: D

February 12, 2018 No Comments READ MORE +