What should you identify?
You have a server named Server1 that runs Windows Server 2012 R2. You discover that the performance of Server1 is poor. The results of a performance report generated on Server1 are shown in the following table. You need to identify the cause of the performance issue. What should you identify?A...
Which actions can User1 perform?
HOTSPOT Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3, and Server4 that run Windows Server 2016. Server1 has IP Address Management (IPAM) installed. Server2, Server3, and Server 4 have the DHCP Server role installed. IPAM manages Server2, Server3, and Server4....
An end user is unable to sign into Jabber. Assuming that network connectivity has been verified, which three settings for the end user should be checked? (Choose three.)
An end user is unable to sign into Jabber. Assuming that network connectivity has been verified, which three settings for the end user should be checked? (Choose three.)A . Jabber Advanced SettingsB . Cisco Unified Communications Manager Service ProfileC . Cisco Unified Communications Manager User ManagementD . Cisco Unified Presence...
What should you do?
DRAG DROP Your network contains an Active Directory domain named contoso.com. All client computers run Windows 7. Group Policy objects (GPOs) are linked to the domain as shown in the exhibit. (Click the Exhibit button.) GPO2 contains user configurations only and GPO3 contains computer configurations only. You need to configure...
Which two ports are used for SIP communications between an endpoint and the SIP server? (Choose two.)
Which two ports are used for SIP communications between an endpoint and the SIP server? (Choose two.)A . 1719 (TCP)B . 5061 (TLS)C . 1721 (TLS)D . 5060 (TCP)E . 1720 (TCP)View AnswerAnswer: BD
Which three access control actions permit traffic to pass through the device when using Cisco FirePOWER? (Choose three.)
Which three access control actions permit traffic to pass through the device when using Cisco FirePOWER? (Choose three.)A . passB . trustC . monitorD . allowE . permitF . inspectView AnswerAnswer: BCD Explanation: http://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHT-System-UserGuide-v5401/AC-Rules-Tuning-Overview.html
When a company puts a security policy in place, what is the effect on the company’s business?
When a company puts a security policy in place, what is the effect on the company’s business?A . Minimizing riskB . Minimizing total cost of ownershipC . Minimizing liabilityD . Maximizing complianceView AnswerAnswer: A
Cisco MPLS TE path setup can be affected by which three tunnel attributes? (Choose three.)
Cisco MPLS TE path setup can be affected by which three tunnel attributes? (Choose three.)A . bandwidthB . delayC . MTUD . priorityE . affinityView AnswerAnswer: A,D,E
Does this meet the goal?
Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites. You plan to deploy DirectAccess. The network security policy states that when client computers connect to the corporate network from the Internet, all of the traffic destined for the Internet must be routed through the corporate...
What happens to your changes alter you click the Publish button on the Publish changes form?
A company announces on September 1 that it plans to add a new division on December 1. You add the following information to the existing organizational hierarchy: • a time zone • a description of the change • an effective date of December 1 for the new division What happens...