Is it possible to access your EBS snapshots?
Is it possible to access your EBS snapshots?A . Yes, through the Amazon 53 APIs.B . Yes, through the Amazon EC2 APIs.C . No, EBS snapshots cannot be accessed; they can only be used to create a new EBS volume.D . EBS doesn't provide snapshots.View AnswerAnswer: B
How many types of block devices does Amazon EC2 support?
How many types of block devices does Amazon EC2 support?A . 4B . 5C . 2D . 1View AnswerAnswer: C Explanation: Amazon EC2 supports 2 types of block devices. Reference: http://docs.amazonwebservices.com/AWSEC2/latest/UserGuide/block-device-mapping-concepts.html
On which two OSI layers does the IEEE focus in 802 standardization? (Choose two.)
On which two OSI layers does the IEEE focus in 802 standardization? (Choose two.)A . physicalB . data-linkC . networkD . transportE . sessionF . presentationG . applicationView AnswerAnswer: A, B
Which container type is described below:
Which container type is described below: Provides application isolation through process and namespace isolation technology. This container shares a kernel with the container host and all containers running on the host.A . Hyper-V ContainerB . Windows Server ContainerView AnswerAnswer: B
Which of the following command line tools can be used to Activate Windows Server?
You have just finished installing Windows Server 2016 on a new server. Your colleague has informed you that its essential that you must activate Windows Server. Which of the following command line tools can be used to Activate Windows Server?A . Netdom C:windowssystem32slmgr.vbs -atoB . Netsh C:windowssystem32slmgr.vbs -atoC . Ocsetup...
Which two characteristics of an application layer firewall are true? (Choose two)
Which two characteristics of an application layer firewall are true? (Choose two)A . provides protection for multiple applicationsB . is immune to URL manipulationC . provides reverse proxy servicesD . provides stateful firewall functionalityE . has low processor usageView AnswerAnswer: AC
Which solution should you recommend?
You need to recommend an appropriate solution for the data mining requirements. Which solution should you recommend?A . Design a schedule process that allocates tasks to multiple virtual machines, and use the Azure Portal to create new VMs as needed.B . Use Azure Batch to schedule jobs and automate scaling...
A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?
A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?A . MSKB . WEP keyC . PassphraseD . PSKView AnswerAnswer: D
What network technology consolidates network and storage traffic in the data center?
What network technology consolidates network and storage traffic in the data center?A . virtual storage-area networkB . unified fabricC . unified computing systemD . virtual switching systemView AnswerAnswer: B
How should you complete the Azure PowerShell command?
HOTSPOT You are an administrator of an Azure subscription for your company. Management asks you to assign the user [email protected] to a role that can create and manage virtual machines (VMs). The user must not be able to manage storage or virtual networks for the MarketingGroupResources resource group. User1 must...