Which of the following storage technologies is file-based?
Which of the following storage technologies is file-based?A . WANB . DASC . SAND . NASView AnswerAnswer: D
Which of the following should be implemented to prevent performance degradation?
A technician is setting up a new network and wants to create redundant paths through the network. Which of the following should be implemented to prevent performance degradation?A . Port mirroringB . Spanning treeC . ARP inspectionD . VLANView AnswerAnswer: B Explanation: The Spanning Tree Protocol (STP) is a network...
Which two tools should you use?
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server5 that has the Windows Server Update Services server role installed. You need to configure Windows Server Update Services (WSUS) on Server5 to use SSI. You install a certificate in the local Computer store. Which...
Which tool should you use?
Your company recently deployed a new Active Directory forest named contoso.com. The forest contains two Active Directory sites named Site1 and Site2. The first domain controller in the forest runs Windows Server 2012 R2. You need to force the replication of the SYSVOL folder from Site1 to Site2. Which tool...
Which two tools should you use?
Your network contains an Active Directory domain named contoso.com. The domain contains three servers named Server1, Server2, and Server3 that run Windows Server 2012 R2. All three servers have the Hyper-V server role installed and the Failover Clustering feature installed. Server1 and Server2 are nodes in a failover cluster named...
Which of the following is used by an IS-IS router to detect other IS-IS neighbor routers and to form adjacencies?
Which of the following is used by an IS-IS router to detect other IS-IS neighbor routers and to form adjacencies?A . ESHB . ISHC . IIHD . PSNPE . CSNPView AnswerAnswer: C
Which Transact-SQL query should you use?
A table named Profits stores the total profit made each year within a territory. The Profits table has columns named Territory, Year, and Profit. You need to create a report that displays the profits made by each territory for each year and its previous year. Which Transact-SQL query should you...
Which cluster configuration would you recommend?
You are asked to size a cluster for a file sharing environment. nfsstat indicates that no more than 10% of the requests are namespace operations (e.g. GETADDR, SETADDR). There will be 10,000 active Linux users, connecting over NFS. Which cluster configuration would you recommend?A . Ten X200 (27 TB) 48...
What should you do on each VPN server?
You are planning the implementation of two new servers that will be configured as RADIUS servers. You need to recommend which configuration must be performed on the VPN servers. The solution must meet the technical requirements. What should you do on each VPN server?A . Add a RADIUS client.B ....
What is the problem?
The IBM Security Access Manager V9.0 deployment professional has enabled the Reverse proxy pdweb, sescache statistic to troubleshoot a problem. What is the problem?A . HTTP sessions are being timed our prematurely.B . HTTP requests are taking longer than expected.C . User sessions are terminated sooner than expected.D . Document...