There are multiple network interfaces on a server. Which parameters must you set in smb.conf to limit which interfaces Samba will accept connections? (Choose TWO correct answers.)
There are multiple network interfaces on a server. Which parameters must you set in smb.conf to limit which interfaces Samba will accept connections? (Choose TWO correct answers.)A . listen interfacesB . bind interfaces onlyC . interfacesD . listen addressView AnswerAnswer: B, C
Which of the following configurations will achieve this?
A host, called lpi, with the MAC address 08:00:2b:4c:59:23 should always be given the IP address of 192.168.1.2 by a DHCP server running ISC DHCPD. Which of the following configurations will achieve this? A . Option AB . Option BC . Option CD . Option DE . Option EView AnswerAnswer:...
Which command is needed to enable DHCP snooping if a switchport is connected to a DHCP server?
Which command is needed to enable DHCP snooping if a switchport is connected to a DHCP server?A . ip dhcp snooping trustB . ip dhcp snoopingC . ip dhcp trustD . ip dhcp snooping informationView AnswerAnswer: A Explanation: When configuring DHCP snooping, follow these guidelines: DHCP snooping is not active...
How can an administrator determine the storage and database paths for a Media Server Deduplication Pool?
How can an administrator determine the storage and database paths for a Media Server Deduplication Pool?A . run the Configure Disk Storage Server wizard for the MSDPB . view Storage Unit > View Properties for the MSOP storage unitC . view Disk Pool > Disk volumes for the MSDP disk...
Which type of solution should you use?
You administer a Microsoft SQL Server 2012 database that includes a table named dbo.Log. This table contains millions of records about user activity in an application. Records in dbo.Log that are more than 90 days old are purged nightly. When records are purged, table locks are causing contention with inserts....
Which option is unnecessary for determining the appropriate containment strategy according to NIST.SP800-61 r2?
Which option is unnecessary for determining the appropriate containment strategy according to NIST.SP800-61 r2?A . effectiveness of the strategyB . time and resource needed to implement the strategyC . need for evidence preservationD . attack vector used to compromise the systemView AnswerAnswer: AB
About the inter-frequency handoff based on the coverage, receive which of the following event will start GAP (inter-frequency) measurements?
About the inter-frequency handoff based on the coverage, receive which of the following event will start GAP (inter-frequency) measurements?A . A1B . A2C . A3D . A4View AnswerAnswer: B
In this scenario, which statement is correct?
You are implementing traffic prioritization in your IP fabric. You must ensure that traffic is handled correctly throughput the fabric. In this scenario, which statement is correct?A . You should implement a BA classifier on all egress interfaces on the leaf devices.B . Rewrite rules must be applied on the...
A security analyst suspects that a workstation may be beaconing to a command and control server. You must inspect the logs from the company’s web proxy server and the firewall to determine the best course of action to take in order to neutralize the threat with minimum impact to the organization
HOTSPOT A security analyst suspects that a workstation may be beaconing to a command and control server. You must inspect the logs from the company’s web proxy server and the firewall to determine the best course of action to take in order to neutralize the threat with minimum impact to...
From the Print Management console, which Print Management node should you select?
Topic 6, Manage data access and protection HOTSPOT You administer Windows 10 Enterprise computers in your company network, including a computer named Wst1. Wst1 is configured with multiple shared printer queues. Wst1 indicates hardware errors. You decide to migrate the printer queues from Wst1 to a new computer named Client1....