What should you do?
You administer a Microsoft SQL Server 2012 failover cluster that contains two nodes named Node A and Node B. A single instance of SQL Server is installed on the cluster. An additional node named Node C has been added to the existing cluster. You need to ensure that the SQL...
What configuration changes should you implement?
Topic 4, automobile parts Case Study 1 Background You manage the Microsoft SQL Server environment for a company that manufactures and sells automobile parts. The environment includes the following servers: SRV1 and SRV2. SRV1 has 16 logical cores and hosts a SQL Server instance that supports a mission-critical application. The...
After an Amazon VPC instance is launched, can I change the VPC security groups it belongs to?
After an Amazon VPC instance is launched, can I change the VPC security groups it belongs to?A . Only if the tag "VPC_Change_Group" is trueB . Yes. You can.C . No. You cannot.D . Only if the tag "VPC Change Group" is trueView AnswerAnswer: B
If the user at extension 1001 dials the user at extension 2111, which dial peer is used to route the call?
Refer to Exhibit: If the user at extension 1001 dials the user at extension 2111, which dial peer is used to route the call?A . 3B . 2C . 4D . 1View AnswerAnswer: D
What should you recommend?
A customer wants to use Microsoft Office 365 ProPlus, Yammer Enterprise, and Microsoft Teams. You need to recommend an Office 365 plan that includes the required functionality. The solution must minimize costs. What should you recommend?A . Office 365 Enterprise E5B . Office 365 Enterprise F1C . Office 365 Enterprise...
routers, and unifies all control plane functions under a single protocol umbrella?
Which protocol runs between the vSmart controllers and between the vSmart controllers and the vEdge routers, and unifies all control plane functions under a single protocol umbrella?A . BGPB . OSPFC . IKED . OMPE . VRRPView AnswerAnswer: D
Which of the following is an example of a cloud-related security risk?
Which of the following is an example of a cloud-related security risk?A . Losing network connectivityB . Not having enough software licensesC . Not knowing what the cloud provider will chargeD . Storing customer data at a providerView AnswerAnswer: D
At which layer does Dynamic ARP Inspection validate packets?
At which layer does Dynamic ARP Inspection validate packets?A . Layer 2B . Layer 3C . Layer 4D . Layer 7View AnswerAnswer: A
Which two editions of Windows 10 can you upgrade the computer?
You have a computer that runs the 32-bit version of Windows 7 Professional. You need to perform an in-place upgrade to Windows 10. Which two editions of Windows 10 can you upgrade the computer? Each correct answer presents a complete solution.A . the 32-bit version of Windows 10 ProB ....
How should you configure Service1?
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. You create a group Managed Service Account named gservice1. You need to configure a service named Service1 to run as the gservice1 account. How should you configure Service1?A...