Which two statements about stack is true? (Choose two.)

Which two statements about stack is true? (Choose two.)A . It is using one IP address to manage all switches.B . It shares one IP address in all switches, but they all work independently.C . It uses proprietary modules.View AnswerAnswer: AB

January 6, 2019 No Comments READ MORE +

The settings for a virtual machine named VM2 are configured as shown in the VM2 exhibit. (Click the Exhibit button

HOTSPOT The settings for a virtual machine named VM2 are configured as shown in the VM2 exhibit. (Click the Exhibit button.) The settings for Disk1.vhdx are configured as shown in the Disk1.vhdx exhibit. (Click the Exhibit button.) The settings for Disk2.vhdx are configured as shown in the Disk2.vhdx exhibit. (Click...

January 6, 2019 No Comments READ MORE +

Which of the following monitoring tools should be used to locate possible outages?

A company is experiencing accessibility issues reaching services on a cloud-based system. Which of the following monitoring tools should be used to locate possible outages?A . Network analyzerB . Packet analyzerC . Protocol analyzerD . Network snifferView AnswerAnswer: A Explanation: A network analyzer is a useful tool, helping you do...

January 6, 2019 No Comments READ MORE +

Based on the Enforcement Policy configuration shown, when a user with Role Remote Worker connects to the network and the posture token assigned is quarantine, which Enforcement Profile will be applied?

Refer to the exhibit. Based on the Enforcement Policy configuration shown, when a user with Role Remote Worker connects to the network and the posture token assigned is quarantine, which Enforcement Profile will be applied?A . RestrictedACLB . Remote Employee ACLC . [Deny Access Profile]D . EMPLOYEE_VLANE . HR VLANView...

January 6, 2019 No Comments READ MORE +

After creating an image and determining the directory location of the malware file, which of the following helps to determine when the system became infected?

A forensic analyst receives a hard drive containing malware quarantined by the antivirus application. After creating an image and determining the directory location of the malware file, which of the following helps to determine when the system became infected?A . The malware file's modify, access, change time properties.B . The...

January 6, 2019 No Comments READ MORE +

What option should they choose in the Git menu to update the branch in the workspace to the current version and then apply each commit that they have created?

A developer is using the DevOps toolchains Web IDE to add a feature to an IBM Cloud application. After the first tests are successful, they notice that the active branch in the origin repository has changed. What option should they choose in the Git menu to update the branch in...

January 6, 2019 No Comments READ MORE +

Which permission level should you grant to the manager?

You are the SharePoint administrator for Contoso, Ltd. You deploy a new team site for the Marketing department to the company's SharePoint environment. The manager for the Marketing department must be able to add and manage groups in the new site. You need to grant the correct permissions to the manager while minimizing administrative impact. Which permission...

January 6, 2019 No Comments READ MORE +

What protocol will the workstation now use to determine the destination MAC address to be placed into frames directed toward the server?

A workstation has just resolved a browser URL to the IP address of a server. What protocol will the workstation now use to determine the destination MAC address to be placed into frames directed toward the server?A . HTTPB . DNSC . DHCPD . RARPE . ARPView AnswerAnswer: E

January 6, 2019 No Comments READ MORE +

Which of the following is the MOST likely cause of this issue?

A network technician has been tasked with deploying new VoIP phones on a network. When the technician plugs the Ethernet cable for the phone into the wall port, the phone fails to turn on. When the technician plugs the Ethernet cable directly into the computer, the computer is able to...

January 6, 2019 No Comments READ MORE +

How can the domain's zone apex, for example, "myzoneapexdomain.com", be pointed towards an Elastic Load Balancer?

How can the domain's zone apex, for example, "myzoneapexdomain.com", be pointed towards an Elastic Load Balancer?A . By using an Amazon Route 53 Alias recordB . By using an AAAA recordC . By using an Amazon Route 53 CNAME recordD . By using an A recordView AnswerAnswer: A

January 6, 2019 No Comments READ MORE +