Is it possible to access your EBS snapshots?

Is it possible to access your EBS snapshots?A . Yes, through the Amazon 53 APIs.B . Yes, through the Amazon EC2 APIs.C . No, EBS snapshots cannot be accessed; they can only be used to create a new EBS volume.D . EBS doesn't provide snapshots.View AnswerAnswer: B

February 10, 2018 No Comments READ MORE +

How many types of block devices does Amazon EC2 support?

How many types of block devices does Amazon EC2 support?A .  4B .  5C .  2D .  1View AnswerAnswer: C Explanation: Amazon EC2 supports 2 types of block devices. Reference: http://docs.amazonwebservices.com/AWSEC2/latest/UserGuide/block-device-mapping-concepts.html

February 10, 2018 No Comments READ MORE +

On which two OSI layers does the IEEE focus in 802 standardization? (Choose two.)

On which two OSI layers does the IEEE focus in 802 standardization? (Choose two.)A . physicalB . data-linkC . networkD . transportE . sessionF . presentationG . applicationView AnswerAnswer: A, B

February 10, 2018 No Comments READ MORE +

Which container type is described below:

Which container type is described below: Provides application isolation through process and namespace isolation technology. This container shares a kernel with the container host and all containers running on the host.A . Hyper-V ContainerB . Windows Server ContainerView AnswerAnswer: B

February 10, 2018 No Comments READ MORE +

Which of the following command line tools can be used to Activate Windows Server?

You have just finished installing Windows Server 2016 on a new server. Your colleague has informed you that its essential that you must activate Windows Server. Which of the following command line tools can be used to Activate Windows Server?A . Netdom C:windowssystem32slmgr.vbs -atoB . Netsh C:windowssystem32slmgr.vbs -atoC . Ocsetup...

February 10, 2018 No Comments READ MORE +

Which two characteristics of an application layer firewall are true? (Choose two)

Which two characteristics of an application layer firewall are true? (Choose two)A . provides protection for multiple applicationsB . is immune to URL manipulationC . provides reverse proxy servicesD . provides stateful firewall functionalityE . has low processor usageView AnswerAnswer: AC

February 9, 2018 No Comments READ MORE +

Which solution should you recommend?

You need to recommend an appropriate solution for the data mining requirements. Which solution should you recommend?A . Design a schedule process that allocates tasks to multiple virtual machines, and use the Azure Portal to create new VMs as needed.B . Use Azure Batch to schedule jobs and automate scaling...

February 9, 2018 No Comments READ MORE +

A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?

A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?A . MSKB . WEP keyC . PassphraseD . PSKView AnswerAnswer: D

February 9, 2018 No Comments READ MORE +

What network technology consolidates network and storage traffic in the data center?

What network technology consolidates network and storage traffic in the data center?A . virtual storage-area networkB . unified fabricC . unified computing systemD . virtual switching systemView AnswerAnswer: B

February 9, 2018 No Comments READ MORE +

How should you complete the Azure PowerShell command?

HOTSPOT You are an administrator of an Azure subscription for your company. Management asks you to assign the user [email protected] to a role that can create and manage virtual machines (VMs). The user must not be able to manage storage or virtual networks for the MarketingGroupResources resource group. User1 must...

February 9, 2018 No Comments READ MORE +