What should you configure?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. You add two...

November 14, 2018 No Comments READ MORE +

Which two statements about late collisions are true? (Choose two.)

Which two statements about late collisions are true? (Choose two.)A . They may indicate a duplex mismatch.B . By definition, they occur after the 512th bit of the frame has been transmitted.C . They indicate received frames that did not pass the FCS match.D . They are frames that exceed...

November 14, 2018 No Comments READ MORE +

Which of the following is a prerequisite for installation of the Veeam plug-in for vSphere Web Client?

Which of the following is a prerequisite for installation of the Veeam plug-in for vSphere Web Client?A . Veeam ONEB . Veeam Backup & ReplicationC . Veeam Management Pack for System CenterD . Veeam Backup Enterprise ManagerView AnswerAnswer: D

November 14, 2018 No Comments READ MORE +

What causes echo or reverberation in the room during a call?

What causes echo or reverberation in the room during a call?A . too many acoustic panelsB . too many hard surfacesC . too many peopleD . too many devicesView AnswerAnswer: B Explanation: A common problem with rooms larger than the Cisco recommended dimensions is excessive reverberation. Large rooms with smooth...

November 14, 2018 No Comments READ MORE +

How can the internal IT department successfully react to cloud computing?

How can the internal IT department successfully react to cloud computing?A . By becoming an external cloud providerB . By becoming an internal cloud providerC . By outsourcing all IT servicesD . By solely focusing on security issuesView AnswerAnswer: B

November 14, 2018 No Comments READ MORE +

Which of the following law is related to fraud and related activity in connection with computers?

Depending upon the Jurisdictional areas, different laws apply to different incidents. Which of the following law is related to fraud and related activity in connection with computers?A . 18 USC 7029B . 18 USC 7030C . 18 USC 7361D . 18 USC 7371View AnswerAnswer: B

November 14, 2018 No Comments READ MORE +

If a user with privilege 15 is matching this command set on Cisco ISE 2.0, which three commands can the user execute?

Refer to the exhibit. If a user with privilege 15 is matching this command set on Cisco ISE 2.0, which three commands can the user execute? (Choose three.)A . configure terminalB . show runC . show clockD . ping 10.10.100.1E . exitF . show ip interface briefView AnswerAnswer: A, B,...

November 14, 2018 No Comments READ MORE +

What is the recommended minimum speed at the edge of the cells in an 802.11g network for a good Cisco VoWLAN deployment?

What is the recommended minimum speed at the edge of the cells in an 802.11g network for a good Cisco VoWLAN deployment?A . 11 Mb/sB . 36 Mb/sC . 12 Mb/sD . 18 Mb/sView AnswerAnswer: C

November 14, 2018 No Comments READ MORE +

You manage 50 computers that run Windows 10 Enterprise

HOTSPOT You manage 50 computers that run Windows 10 Enterprise. You have a Windows to Go workspace installed on a USB drive named USB1. You need to configure USB1 to meet the following requirements: In the table below, select the action that must be performed to achieve each requirement. NOTE:...

November 14, 2018 No Comments READ MORE +

Which three actions should you perform?

Topic 5, Configure storage You have a computer named Computer1 that runs Windows 10 Enterprise. You add a 1 TB hard drive and create a new volume that has the drive letter D. You need to limit the amount of space that each user can consume on D: to 200...

November 14, 2018 No Comments READ MORE +