In MPLS Layer 3 VPN implementations, which mechanism is used to control which routes are imported to a VRF?
In MPLS Layer 3 VPN implementations, which mechanism is used to control which routes are imported to a VRF?A . RTB . RDC . VC IDD . PW IDE . VRF IDView AnswerAnswer: A
Which two tools should you use?
Your network contains an Active Directory domain named contoso.com. The domain contains three servers named Server1, Server2, and Server3 that run Windows Server 2012 R2. All three servers have the Hyper-V server role installed and the Failover Clustering feature installed. Server1 and Server2 are nodes in a failover cluster named...
Which VTP mode is needed to configure an extended VLAN, when a switch is configured to use VTP versions 1 or 2?
Which VTP mode is needed to configure an extended VLAN, when a switch is configured to use VTP versions 1 or 2?A . transparentB . clientC . serverD . Extended VLANs are only supported in version 3 and not in versions 1 or 2View AnswerAnswer: A
What should you modify?
Your company has three offices. The offices are located in New York, London and Sydney. The offices connect to each other by using a WAN link. Each office connects directly to the Internet. The company has an Exchange Server organization. The organization contains six mailbox servers. The servers are configured...
Which of the following NE (Network Element) does the packet not go through when the users are surfing the Internet with cell phone?
Which of the following NE (Network Element) does the packet not go through when the users are surfing the Internet with cell phone?A . MMEB . GGSNC . SGWD . PGWView AnswerAnswer: A
Which of the following protocols uses port 3389?
Which of the following protocols uses port 3389?A . IMAPB . DHCPC . SSHD . RDPView AnswerAnswer: D
Which command is used to obtain the configuration lock in Gaia?
Which command is used to obtain the configuration lock in Gaia?A . Lock database overrideB . Unlock database overrideC . Unlock database lockD . Lock database userView AnswerAnswer: A Explanation: Obtaining a Configuration Lock lock database override unlock database
Which two methods can be used to accomplish this goal?
A backup image on tape is due to expire in one week. The administrator needs to keep the image available for restore indefinitely. Which two methods can be used to accomplish this goal? (Select two.)A . use the bpexpdate command to change the expiration date of the imageB . use...
Refer to the exhibit. CCNA.com has the industrial network shown in the exhibit. All switches are configured as layer 2 switches and are using VLAN 1 as their management VLAN. Each VLAN 1 interface has been assigned the correct IP address. What is the purpose of assigning a default gateway to SW-C switch?
Exhibit: Refer to the exhibit. CCNA.com has the industrial network shown in the exhibit. All switches are configured as layer 2 switches and are using VLAN 1 as their management VLAN. Each VLAN 1 interface has been assigned the correct IP address. What is the purpose of assigning a default...
You plan to use Azure powershell runbook to start a virtual machine named VM1.
You plan to use Azure powershell runbook to start a virtual machine named VM1. You need to add the code to the runbook.A . Workflow{ Start-AzureRMVM -Name VM1 -ResourceGroupName ‘RG1’ }B . Runbook{ Start-AzureRMVM -Name VM1 -ResourceGroupName ‘RG1’ }C . Runbook Runbook1{ Start-AzureRMVM -Name VM1 -ResourceGroupName ‘RG1’ }D . Workflow...