When is it recommended to establish a traffic profile baseline for your network?

When is it recommended to establish a traffic profile baseline for your network?A . outside of normal production hoursB . during a DDoS attackC . during normal production hoursD . during monthly file server backupView AnswerAnswer: C

December 30, 2018 No Comments READ MORE +

In the context of a network security device like an IPS, which event would qualify as having the highest severity?

In the context of a network security device like an IPS, which event would qualify as having the highest severity?A . remote code execution attemptB . brute force login attemptC . denial of service attackD . instant messenger activityView AnswerAnswer: A

December 30, 2018 No Comments READ MORE +

Which OSPF concept is used to relate areas to the backbone area through another area?

Which OSPF concept is used to relate areas to the backbone area through another area?A . Virtual LinksB . Backup LinksC . Inter-backbone LinksD . Point-to-point LinksView AnswerAnswer: A

December 30, 2018 No Comments READ MORE +

When your wireless client device roams from one AP to another on the same network, which IEEE protocol can be used to authenticate the clients faster?

When your wireless client device roams from one AP to another on the same network, which IEEE protocol can be used to authenticate the clients faster?A . 802.11r also called Assisted RoamingB . 802.11k also called Assisted RoamingC . 802.11r also called Fast BSS TransitionD . 802.11k also called Predictive...

December 30, 2018 No Comments READ MORE +

Transactions are used to ...

Transactions are used to ...A . guarantee high performanceB . secure data consistencyC . secure access to the databaseD . reduce the database server overheadE . reduce code size in PHPView AnswerAnswer: B

December 30, 2018 No Comments READ MORE +

What should you do?

You plan to use Power BI Desktop to create a report. The report will consume data from an on-premises tabular database named SalesDB in Microsoft SQL Server Analysis Service (SSAS). The report will be published to the Power BI service. You need to ensure that the report published to the...

December 30, 2018 No Comments READ MORE +

What protocol is used to determine the best pathway back to a root access point?

What protocol is used to determine the best pathway back to a root access point?A . CCKMB . WNMPC . AWPPD . LWAPView AnswerAnswer: C

December 30, 2018 No Comments READ MORE +

Which of the following is MOST likely the problem?

A customer is reporting difficulty connecting some devices after replacing a wireless router with a new wireless 802.11ac router. The SSID, encryption and password are the same as the previous router. A technician goes on-site and notices the devices that are no longer connecting appear to be several years ago....

December 30, 2018 No Comments READ MORE +

When identifying Cisco TelePresence Endpoint traffic characteristics, which three statements are true? (Choose three.)

When identifying Cisco TelePresence Endpoint traffic characteristics, which three statements are true? (Choose three.)A .  Latency, jitter, and loss are measured in a round-trip fashion.B .  Latency, jitter, and loss are measured unidirectionally.C .  Latency and loss are measured at a packet level, based on RTP header sequence numbers and...

December 30, 2018 No Comments READ MORE +

You have an exchange server 2016 organization. The organization contains two servers named EX01 and EX02. Both servers are members of a database availability group (DAG) named DAG01. DAG01 contains two mailbox databases named DB01 and DB02. DB01 and DB02 are replicated to all of the members of DAG01

HOTSPOT You have an exchange server 2016 organization. The organization contains two servers named EX01 and EX02. Both servers are members of a database availability group (DAG) named DAG01. DAG01 contains two mailbox databases named DB01 and DB02. DB01 and DB02 are replicated to all of the members of DAG01....

December 30, 2018 No Comments READ MORE +