What should you do?
You administer an Active Directory Domain Services environment. There are no certification authorities (CAs) in the environment. You plan to implement a two-tier CA hierarchy with an offline root CA. You need to ensure that the issuing CA is not used to create additional subordinate CAs. What should you do?...
Which unit test should you use?
You are developing an ASP.NET MVC web application that includes the following method. You need to test the AccountBalance method. Which unit test should you use? A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: C Explanation: All unit tests require the [TestMethod] attribute. The...
Which option should you use?
You are a Microsoft Dynamics 365 for Retail administrator. You need to modify a store record to set up tax calculations based on the delivery location. Which option should you use?A . sales tax code for a customer delivery addressB . sales tax groupC . sales tax code on a...
While running a 4GL application that utilizes cursors heavily, what can you do if the amount of free memory falls dangerously low?
While running a 4GL application that utilizes cursors heavily, what can you do if the amount of free memory falls dangerously low?A . Use the END "cursorname" statement after using a cursor.B . Use the DROP "cursorname" statement after using a cursor.C . Use the FREE "cursorname" statement after using...
How can the administrator add a four month retention?
Weekly full backups run for client A on maeter1 using a storage unit that belongs to medial. The administrator is required to retain client A’s full backups for a period of four months. When the administrator modifies the full schedule, an option for 4 months is missing from the Retention...
What is the definition of confidentiality according to CVSSv3 framework?
What is the definition of confidentiality according to CVSSv3 framework?A . this metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability.View AnswerAnswer: A
( single ) When multicast services are configured on the MA5600T/MA5680T, multicast VLAN programs use static configuration. Which of the following options can be used or not?
( single ) When multicast services are configured on the MA5600T/MA5680T, multicast VLAN programs use static configuration. Which of the following options can be used or not?A . service-portB . igmp userC . igmp programD . igmp profileView AnswerAnswer: D
Which statement is true in this scenario?
A customer ordered two new DS224C shelves. The Customer wants you to add these shelves to an existing stack which consists of two DS2246 shelves. Which statement is true in this scenario?A . You need to order additional cables to expand the existing stack.B . You cannot mix DS224C and...
Which of the following is one of the main goals of the CSIRT?
Which of the following is one of the main goals of the CSIRT?A . To configure the organization's firewallsB . To monitor the organization's IPS devicesC . To minimize and control the damage associated with incidents, provide guidance for mitigation, and work to prevent future incidentsD . To hire security...
Which three are supported upgrade processes for ESXi host? (Choose three.)
Which three are supported upgrade processes for ESXi host? (Choose three.)A . using vSphere Auto DeployB . using a TFTP serverC . using Update ManagerD . using an ESXCLI commandE . installing from CIFS shareView AnswerAnswer: A,C,D