Which two troubleshooting tools would initially be the best to use when troubleshooting the PSTN gateway side of a call routing issue while using Cisco Unified Communications Manager? (Choose two.)

Which two troubleshooting tools would initially be the best to use when troubleshooting the PSTN gateway side of a call routing issue while using Cisco Unified Communications Manager? (Choose two.)A .  RTMT trace outputB .  Cisco IOS debug commandsC .  Dialed Number Analyzer outputD .  Cisco Unified Communications Manager alertsE...

January 1, 2019 No Comments READ MORE +

Which tools can capture the workload requirements?

A potential customer uses a solution from an EMC competitor for NFS storage in their main data center. The existing arrays are five years old, and the customer would like to consolidate them into a single new system. The entire workload is generated by eight Linux hosts connected to the...

January 1, 2019 No Comments READ MORE +

Which SAN port type should you use on an NPIV core switch that connects to an NPV edge switch?

Which SAN port type should you use on an NPIV core switch that connects to an NPV edge switch?A . FLB . FC . ND . TEE . EView AnswerAnswer: B

January 1, 2019 No Comments READ MORE +

Which well-known port is used to access the Cisco IP Video Surveillance Operations Manager via a secure, ActiveX web session?

Which well-known port is used to access the Cisco IP Video Surveillance Operations Manager via a secure, ActiveX web session?A . 20B . 80C . 421D . 434E . 443F . 8080View AnswerAnswer: E

January 1, 2019 No Comments READ MORE +

What method should you use to deploy servers?

What method should you use to deploy servers?A . WDSB . AIKC . ADKD . EDTView AnswerAnswer: A Explanation:WDS is a server role that enables you to remotely deploy Windows operating systems. You can use it to set up new computers by using a network-based installation. This means that you...

January 1, 2019 No Comments READ MORE +

Which interface card is an encryption module?

Which interface card is an encryption module?A . NME-VMSS-16B . NME-CUSP-522C . AIM-VPN/SSL-3D . M-1A-OC3-POMView AnswerAnswer: C

January 1, 2019 No Comments READ MORE +

What should you use?

You observe that several indexes are fragmented. You need to rebuild the indexes. What should you use?A . Activity MonitorB . Sp_who3C . Object Explorer in the SQL Server Management Studio (SSMS)D . SQL Server Data CollectorE . SQL Server Data Tools (SSDT)F . SQL Server Configuration ManagerView AnswerAnswer: C...

January 1, 2019 No Comments READ MORE +

Which protocol is used to extend Layer 2 for long-distance bridging?

Which protocol is used to extend Layer 2 for long-distance bridging?A . OTVB . VXLANC . LISPD . VPNE . NvGREView AnswerAnswer: A

January 1, 2019 No Comments READ MORE +

Which log entry should you use to verify access?

You administer an Azure Storage account named contosostorage. The account has a blob container to store image files. A user reports being unable to access an image file. You need to verify that anonymous users can successfully read Image files from the container. Which log entry should you use to...

January 1, 2019 No Comments READ MORE +

What should you identify?

Your network contains a perimeter network and an internal network. The internal network contains an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as the attribute store. You plan to deploy a federation server proxy to a server named Server2 in the perimeter network. You...

January 1, 2019 No Comments READ MORE +