Which of the following techniques can be used to get the time information in this scenario?

A customer has a z13 server. They plan to use Server Time Protocol (STP) for accessing an external time source (UTC). Which of the following techniques can be used to get the time information in this scenario?A . Configuration of a Network Time Protocol (NTP) client on the HMC which...

November 18, 2018 No Comments READ MORE +

Which of the following options is a hierarchy that is used in knowledge management?

Which of the following options is a hierarchy that is used in knowledge management?A . Wisdom - Information - Data - KnowledgeB . Data - Information - Knowledge - WisdomC . Knowledge -Wisdom - Information - DataD . Information - Data - Knowledge - WisdomView AnswerAnswer: B

November 18, 2018 No Comments READ MORE +

What should you use?

You have a computer named Computer1 that runs Windows 10. Computer1 has two volumes named C and D. Volume C is formatted NTFS and volume D is formatted exFAT. You need to ensure that you can recover files stored in D:Data. What should you use?A . System Restore pointsB ....

November 18, 2018 No Comments READ MORE +

Which of the below mentioned actions should he perform?

A user wants to increase the durability and availability of the EBS volume. Which of the below mentioned actions should he perform?A .  Take regular snapshots.B .  Create an AMD .  Create EBS with higher capacity.E .  Access EBS regularly.View AnswerAnswer: A Explanation: In Amazon Web Services, Amazon EBS volumes that operate...

November 18, 2018 No Comments READ MORE +

 In a shared processing environment, the biggest challenges are:

 In a shared processing environment, the biggest challenges are:A . Separate customer data.B . Consolidation results.C . Consistent standardsD . Separate the customer network.View AnswerAnswer: C

November 18, 2018 No Comments READ MORE +

Does this meet the goal?

You need to automatically restart the appropriate web service on DETCRL01 and CHICRL01 if the web service is stopped. Solution: You create a recovery task in SCOM and configure it to start the World Wide Web publishing service. Does this meet the goal?A . YesB . NoView AnswerAnswer: A Explanation:...

November 18, 2018 No Comments READ MORE +

Endpoints assigned to an EPG can be defined in several ways. What is an eligible attribute for this assignment?

Endpoints assigned to an EPG can be defined in several ways. What is an eligible attribute for this assignment?A . VLANB . VXLAN or NVGREC . VMware port groupD . Layer 4 service portView AnswerAnswer: A

November 18, 2018 No Comments READ MORE +

Which function key is used to start Safe Mode in Windows NT?

Which function key is used to start Safe Mode in Windows NT?A . F10B . F8C . F6D . Windows NT does not support Safe ModeView AnswerAnswer: D

November 18, 2018 No Comments READ MORE +

What do you use when you have a network object or group and want to use an IP address?

What do you use when you have a network object or group and want to use an IP address?A . Static NATB . Dynamic NATC . identity NATD . Static PATView AnswerAnswer: B

November 18, 2018 No Comments READ MORE +

Which of the following would need to be configured on each network device to provide that information in a secure manner?

A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices. Which of the following would need to be configured on each network device to provide that information in a secure manner?A . S/MIMEB . SYSLOGC . PGPD ....

November 18, 2018 No Comments READ MORE +