Information system auditors should primarily review which of the following to understand the main drivers of the project?

 Information system auditors should primarily review which of the following to understand the main drivers of the project?A . Business caseB . Earned value analysisC . IT strategy and goalsD . Project risk matrixView AnswerAnswer: C

January 11, 2019 No Comments READ MORE +

In the Cisco Unified Contact Center Enterprise with Cisco Unified CVP, which two statements about how to increase the Cisco Unified CVP availability are true? (Choose two.)

In the Cisco Unified Contact Center Enterprise with Cisco Unified CVP, which two statements about how to increase the Cisco Unified CVP availability are true? (Choose two.)A . Must have SIP Proxy server to pass messages between the gateways and the Cisco Unified CVP servers.B . Must have voice gateway...

January 11, 2019 No Comments READ MORE +

What should you include in the report?

An organization is implementing a SAM program. The organization is focused on achieving Tier 1 of the ISO 19770-1 specification. You need to verity that contracts are reported on and inventoried. What should you include in the report?A . the last reported hardware inventory dateB . any approved exceptions to...

January 11, 2019 No Comments READ MORE +

Which of the following devices would be the MOST cost efficient to use for this backup?

A SQL server needs several terabytes of disk space available to do an uncompressed backup of a database. Which of the following devices would be the MOST cost efficient to use for this backup?A . iSCSI SANB . FCoE SANC . NASD . USB flash driveView AnswerAnswer: C Explanation: A...

January 11, 2019 No Comments READ MORE +

What should you do?

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. VM1 has several snapshots. You need to modify the snapshot file location of VM1. What should you do?A . Right-click VM1, and then click...

January 11, 2019 No Comments READ MORE +

How must Samba be configured such that it can check CIFS passwords against those found in /etc/passwd and /etc/shadow?

How must Samba be configured such that it can check CIFS passwords against those found in /etc/passwd and /etc/shadow?A . Set the parameters “encrypt passwords = yes” and “password file = /etc/passwd”B . Set the parameters “encrypt passwords = yes”, “password file = /etc/passwd” and “password algorithm = crypt”C ....

January 11, 2019 No Comments READ MORE +

Which command verifies the digits that are received by voice-port?

A voice engineer is troubleshooting an issue that involves incoming calls to POTS lines. Which command verifies the digits that are received by voice-port?A . debug voip dial-perB . debug vtsp sessionC . debug vtsp dspD . debug call treatmentE . debug voice protocolView AnswerAnswer: B

January 11, 2019 No Comments READ MORE +

What is the last action item during physical setup of the IX5000?

What is the last action item during physical setup of the IX5000?A . Install pillars, crossbars, and rear kick plate and toe cup.B . Install fascia, display trip, and outer panels.C . Install Touch 10 devices.D . Perform cable routing.View AnswerAnswer: B Explanation: http://www.cisco.com/c/dam/en/us/td/docs/telepresence/ix5000/assembly_guide/ix5000_install_gui de.pdf

January 11, 2019 No Comments READ MORE +

Which command is used to verify that a server is connected to the network?

Which command is used to verify that a server is connected to the network?A . IPCON FIGB . ROUTEC . PINGD . CHECKView AnswerAnswer: C

January 11, 2019 No Comments READ MORE +