What does administrative distance refer to?
What does administrative distance refer to?A . the cost of a link between two neighboring routersB . the advertised cost to reach a networkC . the cost to reach a network that is administratively setD . a measure of the trustworthiness of a routing information sourceView AnswerAnswer: D Explanation: Administrative...
What should you do?
You administer a Microsoft SQL Server 2012 database. The database contains a Product table created by using the following definition: You need to ensure that the minimum amount of disk space is used to store the data in the Product table. What should you do?A . Convert all indexes to...
Which three options can be pushed from Cisco ISE server as part of a successful 802.1x authentication. (Choose three)
Which three options can be pushed from Cisco ISE server as part of a successful 802.1x authentication. (Choose three)A . authentication orderB . posture statusC . authentication priorityD . vlanE . DACLF . re-authentication timerView AnswerAnswer: D, E, F
What action does the hub take when it receives a NHRP resolution request from a spoke for a network that exists behind another spoke?
What action does the hub take when it receives a NHRP resolution request from a spoke for a network that exists behind another spoke?A . The hub sends back a resolution reply to the requesting spoke.B . The hub updates its own NHRP mapping.C . The hub forwards the request...
What is the deployment option for the Engagement Development Platform?
What is the deployment option for the Engagement Development Platform?A . Appliance-based applicationB . Avaya Platform virtualized applicationC . Avaya Live cloud-based applicationD . VMware virtualized applicationView AnswerAnswer: D
How can the administrator resolve this issue?
An administrator notices that a virtual machine running SQL Server is not performing as expected. Upon checking the logs, the administrator sees the following error: vmware.log> vmx| W110: NUMA and VCPU hot add are incompatible. Forcing UMA How can the administrator resolve this issue?A . Power off the virtual machine...
What is one function of key server in Cisco GETVPN deployment?
What is one function of key server in Cisco GETVPN deployment? A. sending the RSA certificate B. providing pre-shared keys C. maintaining security polices D. providing the group IDView AnswerAnswer: C Explanation: Key server is responsible for maintaining security policies, authenticating the GMs and providing the session key for encrypting...
Which of the following should the penetration tester spoof to get the MOST information?
A penetration tester is performing ARP spoofing against a switch. Which of the following should the penetration tester spoof to get the MOST information?A . MAC address of the clientB . MAC address of the domain controllerC . MAC address of the web serverD . MAC address of the gateway...
Which describes the best method for preserving the chain of evidence?
Which describes the best method for preserving the chain of evidence?A . Shut down the machine that is infected, remove the hard drive, and contact the local authorities.B . Back up the hard drive, use antivirus software to clean the infected machine, and contact the local authorities.C . Identify the...
Which one of the following products provides the ability to monitor case processes and to analyze historical data?
Which one of the following products provides the ability to monitor case processes and to analyze historical data?A . Case MonitorB . FileNet Case AnalyzerC . Cognos Real-time monitoringD . Cognos Business IntelligenceView AnswerAnswer: B