What should you identify?

You have a server named Server1 that runs Windows Server 2012 R2. You discover that the performance of Server1 is poor. The results of a performance report generated on Server1 are shown in the following table. You need to identify the cause of the performance issue. What should you identify?A...

January 9, 2019 No Comments READ MORE +

Which actions can User1 perform?

HOTSPOT Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3, and Server4 that run Windows Server 2016. Server1 has IP Address Management (IPAM) installed. Server2, Server3, and Server 4 have the DHCP Server role installed. IPAM manages Server2, Server3, and Server4....

January 9, 2019 No Comments READ MORE +

An end user is unable to sign into Jabber. Assuming that network connectivity has been verified, which three settings for the end user should be checked? (Choose three.)

An end user is unable to sign into Jabber. Assuming that network connectivity has been verified, which three settings for the end user should be checked? (Choose three.)A . Jabber Advanced SettingsB . Cisco Unified Communications Manager Service ProfileC . Cisco Unified Communications Manager User ManagementD . Cisco Unified Presence...

January 9, 2019 No Comments READ MORE +

What should you do?

DRAG DROP Your network contains an Active Directory domain named contoso.com. All client computers run Windows 7. Group Policy objects (GPOs) are linked to the domain as shown in the exhibit. (Click the Exhibit button.) GPO2 contains user configurations only and GPO3 contains computer configurations only. You need to configure...

January 9, 2019 No Comments READ MORE +

Which two ports are used for SIP communications between an endpoint and the SIP server? (Choose two.)

Which two ports are used for SIP communications between an endpoint and the SIP server? (Choose two.)A . 1719 (TCP)B . 5061 (TLS)C . 1721 (TLS)D . 5060 (TCP)E . 1720 (TCP)View AnswerAnswer: BD

January 9, 2019 No Comments READ MORE +

Which three access control actions permit traffic to pass through the device when using Cisco FirePOWER? (Choose three.)

Which three access control actions permit traffic to pass through the device when using Cisco FirePOWER? (Choose three.)A . passB . trustC . monitorD . allowE . permitF . inspectView AnswerAnswer: BCD Explanation: http://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHT-System-UserGuide-v5401/AC-Rules-Tuning-Overview.html

January 9, 2019 No Comments READ MORE +

When a company puts a security policy in place, what is the effect on the company’s business?

When a company puts a security policy in place, what is the effect on the company’s business?A . Minimizing riskB . Minimizing total cost of ownershipC . Minimizing liabilityD . Maximizing complianceView AnswerAnswer: A

January 9, 2019 No Comments READ MORE +

Cisco MPLS TE path setup can be affected by which three tunnel attributes? (Choose three.)

Cisco MPLS TE path setup can be affected by which three tunnel attributes? (Choose three.)A . bandwidthB . delayC . MTUD . priorityE . affinityView AnswerAnswer: A,D,E

January 9, 2019 No Comments READ MORE +

Does this meet the goal?

Your network contains an Active Directory domain named contoso.com. The domain contains multiple sites. You plan to deploy DirectAccess. The network security policy states that when client computers connect to the corporate network from the Internet, all of the traffic destined for the Internet must be routed through the corporate...

January 9, 2019 No Comments READ MORE +

What happens to your changes alter you click the Publish button on the Publish changes form?

A company announces on September 1 that it plans to add a new division on December 1. You add the following information to the existing organizational hierarchy: • a time zone • a description of the change • an effective date of December 1 for the new division What happens...

January 9, 2019 No Comments READ MORE +