Which two troubleshooting tools would initially be the best to use when troubleshooting the PSTN gateway side of a call routing issue while using Cisco Unified Communications Manager? (Choose two.)
Which two troubleshooting tools would initially be the best to use when troubleshooting the PSTN gateway side of a call routing issue while using Cisco Unified Communications Manager? (Choose two.)A . RTMT trace outputB . Cisco IOS debug commandsC . Dialed Number Analyzer outputD . Cisco Unified Communications Manager alertsE...
Which tools can capture the workload requirements?
A potential customer uses a solution from an EMC competitor for NFS storage in their main data center. The existing arrays are five years old, and the customer would like to consolidate them into a single new system. The entire workload is generated by eight Linux hosts connected to the...
Which SAN port type should you use on an NPIV core switch that connects to an NPV edge switch?
Which SAN port type should you use on an NPIV core switch that connects to an NPV edge switch?A . FLB . FC . ND . TEE . EView AnswerAnswer: B
Which well-known port is used to access the Cisco IP Video Surveillance Operations Manager via a secure, ActiveX web session?
Which well-known port is used to access the Cisco IP Video Surveillance Operations Manager via a secure, ActiveX web session?A . 20B . 80C . 421D . 434E . 443F . 8080View AnswerAnswer: E
What method should you use to deploy servers?
What method should you use to deploy servers?A . WDSB . AIKC . ADKD . EDTView AnswerAnswer: A Explanation:WDS is a server role that enables you to remotely deploy Windows operating systems. You can use it to set up new computers by using a network-based installation. This means that you...
Which interface card is an encryption module?
Which interface card is an encryption module?A . NME-VMSS-16B . NME-CUSP-522C . AIM-VPN/SSL-3D . M-1A-OC3-POMView AnswerAnswer: C
What should you use?
You observe that several indexes are fragmented. You need to rebuild the indexes. What should you use?A . Activity MonitorB . Sp_who3C . Object Explorer in the SQL Server Management Studio (SSMS)D . SQL Server Data CollectorE . SQL Server Data Tools (SSDT)F . SQL Server Configuration ManagerView AnswerAnswer: C...
Which protocol is used to extend Layer 2 for long-distance bridging?
Which protocol is used to extend Layer 2 for long-distance bridging?A . OTVB . VXLANC . LISPD . VPNE . NvGREView AnswerAnswer: A
Which log entry should you use to verify access?
You administer an Azure Storage account named contosostorage. The account has a blob container to store image files. A user reports being unable to access an image file. You need to verify that anonymous users can successfully read Image files from the container. Which log entry should you use to...
What should you identify?
Your network contains a perimeter network and an internal network. The internal network contains an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as the attribute store. You plan to deploy a federation server proxy to a server named Server2 in the perimeter network. You...