Which of the following documents should be used to provide high-level reporting to key stakeholders?
Which of the following documents should be used to provide high-level reporting to key stakeholders?A . DashboardB . Communication planC . Statement of workD . Project charterView AnswerAnswer: A Explanation: References: Kim Heldman, CompTIA Project+ Study Guide, 2nd Edition, Sybex, Indianapolis, 2017, p. 325
You are at school and logged in to a Windows 7 computer using a standard user account. You need to change some of the properties of a desktop icon for an assignment. Your instructor provides you with an administrator username and password and asks you to do two tasks
HOTSPOT You are at school and logged in to a Windows 7 computer using a standard user account. You need to change some of the properties of a desktop icon for an assignment. Your instructor provides you with an administrator username and password and asks you to do two tasks....
Which benefit is provided by the Instant GRT (Granular Recovery Technology) feature?
Which benefit is provided by the Instant GRT (Granular Recovery Technology) feature?A . detailed catalog informationB . the ability to perform a search of GRT items from the catalogC . faster browsing of GRT data on restoresD . faster backupsView AnswerAnswer: C Explanation: https://www.veritas.com/support/en_US/article.000108683
What is the default storage location of user-level bookmarks in an IOS clientless SSL VPN?
What is the default storage location of user-level bookmarks in an IOS clientless SSL VPN?A . disk0:/webvpn/{context name}/B . disk1:/webvpn/{context name}/C . flash:/webvpn/{context name}/D . nvram:/webvpn/{context name}/View AnswerAnswer: C
Which algorithm should you use?
You are developing an application that will transmit large amounts of data between a client computer and a server. You need to ensure the validity of the data by using a cryptographic hashing algorithm. Which algorithm should you use?A . HMACSHA256B . RNGCryptoServiceProviderC . DESD . AesView AnswerAnswer: A Explanation:...
Which of the following server types requires the LARGEST amount of available hard drive space?
Which of the following server types requires the LARGEST amount of available hard drive space?A . Database serverB . Remote access serverC . Print serverD . Directory serverView AnswerAnswer: A
Which cmdlet should you use?
You have an Exchange Server 2016 organization. The organization contains a database availability group (DAG). You need to identify the number of transaction logs that are in replay queue. Which cmdlet should you use?A . Test-ServiceHealthB . Test-ReplicationHealthC . Get-DatabaseAvailabilityGroupD . Get-MailboxDatabaseCopyStatusView AnswerAnswer: D Explanation: References: https://technet.microsoft.com/en-us/library/bb691314(v=exchg.160).aspx?f=255&MSPPError=-2147217396
What must the administrator do to the policy to make the Synthetic backup option available for selection?
An administrator is attempting to configure a new backup policy using synthetic backups. When creating a new full backup schedule, the Synthetic backup option is unable to be selected. What must the administrator do to the policy to make the Synthetic backup option available for selection?A . create a differential...
What will be the outcome of this state?
ClearPass and a wired switch are configured for 802.1x authentication with RADIUS CoA (RFC 3576) on UDP port 3799. This port has been blocked by a firewall between the wired switch and ClearPass. What will be the outcome of this state?A . RADIUS Authentications will fail because the wired switch...
When using the IBM Domino Java Document class method computeWithForm, which three events are triggered? (Choose three.)
When using the IBM Domino Java Document class method computeWithForm, which three events are triggered? (Choose three.)A . Default ValueB . Input ValidationC . Input TranslationD . QueryDocumentSaveE . Computed for displayF . Compute before validationView AnswerAnswer: ABC