In this scenario, what are the minimum number of iSCSI LIF needed?

You want to configure iSCSI on a 4-node cluster that only has NFS configured. You need to guarantee that you have at least two optimized paths per LUN. In this scenario, what are the minimum number of iSCSI LIF needed?A . 6B . 4C . 8D . 2View AnswerAnswer: C

January 4, 2019 No Comments READ MORE +

A company provides on-demand virtual computing for a sensitive project. The company implements a fully virtualized datacenter and terminal server access with two-factor authentication for access to sensitive data. The security administrator at the company has uncovered a breach in data confidentiality. Sensitive data was found on a hidden directory within the hypervisor. Which of the following has MOST likely occurred?

A company provides on-demand virtual computing for a sensitive project. The company implements a fully virtualized datacenter and terminal server access with two-factor authentication for access to sensitive data. The security administrator at the company has uncovered a breach in data confidentiality. Sensitive data was found on a hidden directory...

January 4, 2019 No Comments READ MORE +

Which term defines the initial event in the NIST SP800-61 r2?

An organization has recently adjusted its security stance in response to online threats made by a known hacktivist group. Which term defines the initial event in the NIST SP800-61 r2?A . instigatorB . precursorC . online assaultD . triggerView AnswerAnswer: B

January 4, 2019 No Comments READ MORE +

What should you do?

An organization implements a SAM program. The organization's IT department tags physical assets with custom serial number tags. The asset serial number and device serial number are stored in a workbook. The IT department downloads a CSV file of licenses from the Microsoft Volume Licensing Service Center (VISC). You need...

January 4, 2019 No Comments READ MORE +

Assuming that the two Cisco SAF Forwarders are adjacent to each other and that no SAF clients have been configured, which statement is true?

Refer to the exhibit. Assuming that the two Cisco SAF Forwarders are adjacent to each other and that no SAF clients have been configured, which statement is true?A .  The Cisco SAF Forwarders will not establish a neighbor relationship because the service-family external-client configuration is missing.B .  The Cisco SAF...

January 4, 2019 No Comments READ MORE +

Which two options would cause switch fabrics not to merge? (Choose two.)

Which two options would cause switch fabrics not to merge? (Choose two.)A . The switches have different assigned VSANs on the connecting pons.B . The switches do not have at least one assigned domain ID in common.C . The election of the static domain is only determined by the WWNs...

January 4, 2019 No Comments READ MORE +

Which Transact-SQL statement should you use?

You administer a Microsoft SQL Server 2012. A process that normally runs in less than 10 seconds has been running for more than an hour. You examine the application log and discover that the process is using session ID 60. You need to find out whether the process is being...

January 4, 2019 No Comments READ MORE +

How can an administrator copy an existing backup image of client1.example.com from an Advanced Disk storage unit to a Media Server Deduplication Pool (MSDP)?

How can an administrator copy an existing backup image of client1.example.com from an Advanced Disk storage unit to a Media Server Deduplication Pool (MSDP)?A . run bpimport with the source and the destination storage unitB . create a Storage Lifecycle Policy that contains a duplication to the MSDP poolC ....

January 4, 2019 No Comments READ MORE +

Which two statements about PPP CHAP authentication are true? (Choose two)

Which two statements about PPP CHAP authentication are true? (Choose two)A . It is a one-way authentication methodB . It uses a secret password, which is sent across the link for authenticationC . It supports clear-text passwordsD . It is configurable only on PPP callout linksE . It uses a...

January 4, 2019 No Comments READ MORE +

What configuration would be necessary to cut down on the use of mobility tunnels for voice clients?

A customer has deployed an N+N redundant wireless infrastructure. In this deployment, the access points have been salt and peppered between controllers. What configuration would be necessary to cut down on the use of mobility tunnels for voice clients?A . mobility anchorB . KIS based CACC . media session snoopingD...

January 4, 2019 No Comments READ MORE +