What should you do?

You are the Office 365 administrator for your company. The company has a single Active Directory Domain Services domain. As part of the Office 365 deployment, the company is preparing to deploy Office Telemetry. You need to disguise file names and document titles, while still collecting the telemetry data. What...

November 14, 2018 No Comments READ MORE +

Which algorithm should you use?

You are developing an application that will transmit large amounts of data between a client computer and a server. You need to ensure the validity of the data by using a cryptographic hashing algorithm. Which algorithm should you use?A . ECDsaB . RNGCryptoServiceProviderC . Rfc2898DeriveBytesD . HMACSHA512View AnswerAnswer: D

November 14, 2018 No Comments READ MORE +

Which four devices can be used to provide analog ports, traditional phones, and fax machines? (Choose four.)

Which four devices can be used to provide analog ports, traditional phones, and fax machines? (Choose four.)A . Cisco VG224 Analog Voice GatewayB . Foreign Exchange Station Voice Interface CardC . Cisco High Density VoiceFax Network ModuleD . Cisco ATA190 Analog Telephone AdapterE . Cisco VG350 Analog Voice GatewayF ....

November 14, 2018 No Comments READ MORE +

Which statement about customization of a web page that is used on a WLC to authorize guest users is true?

Which statement about customization of a web page that is used on a WLC to authorize guest users is true?A . The administrator can use either a modified internal login page or the customized web page.B . The administrator can use only the internal login page, and only the organization...

November 14, 2018 No Comments READ MORE +

Which type of data collector should you create?

You have a server named Server1 that runs Windows Server 2012 R2. You create a custom Data Collector Set (DCS) named DCS1. You need to configure Server1 to start DCS1 automatically when the network usage exceeds 70 percent. Which type of data collector should you create?A . A performance counter...

November 14, 2018 No Comments READ MORE +

Which three are common ISP access network technologies? (Choose three.)

Which three are common ISP access network technologies? (Choose three.)A . DSLB . Cable modemC . DWDMD . MPLSE . PONF . MP-BGPView AnswerAnswer: A,B,E

November 14, 2018 No Comments READ MORE +

Which statements are true about EIGRP successor routes? (Choose two.)

Which statements are true about EIGRP successor routes? (Choose two.)A . A successor route is used by EIGRP to forward traffic to a destination.B . Successor routes are saved in the topology table to be used if the primary route fails.C . Successor routes are flagged as 'active' in the...

November 14, 2018 No Comments READ MORE +

Which of the following is a technical control that the security administrator should implement next to reduce malware infection?

A security administrator has noticed that an increased number of employees' workstations are becoming infected with malware. The company deploys an enterprise antivirus system as well as a web content filter, which blocks access to malicious web sites where malware files can be downloaded. Additionally, the company implements technical measures...

November 14, 2018 No Comments READ MORE +

Which module does the Cisco AnyConnect Secure Mobility client integrate into the AnyConnect client package for access to both wired and wireless networks?

Which module does the Cisco AnyConnect Secure Mobility client integrate into the AnyConnect client package for access to both wired and wireless networks?A . Network Access ManagerB . TelemetryC . Web SecurityD . DARTView AnswerAnswer: A

November 14, 2018 No Comments READ MORE +

Which two statements about the VLAN database are true? (Choose two.)

Which two statements about the VLAN database are true? (Choose two.)A . VLAN information is stored in the running configurationB . It supports VLANs 1 to 1001C . If the switch is in VTP transparent mode, the VLAN can be configured if it is in VLAN database mode.D . It...

November 14, 2018 No Comments READ MORE +