What should you recommend?

You have a SQL Server instance on a server named Server1. You need to recommend a solution to perform the following tasks every week: Rebuild the indexes by using a new fill factor. Run a custom T-SQL command. Back up the databases. What should you recommend? More than one answer...

November 7, 2018 No Comments READ MORE +

Because all the secret keys are held and authentication is performed on the Kerberos TGS and the authentication servers, these servers are vulnerable to:

Because all the secret keys are held and authentication is performed on the Kerberos TGS and the authentication servers, these servers are vulnerable to:A .  neither physical attacks nor attacks from malicious code.B .  physical attacks onlyC .  both physical attacks and attacks from malicious code.D .  physical attacks but...

November 7, 2018 No Comments READ MORE +

Which two statements indicate likely causes of the problem?

An administrator receives a report that no real time statistics are available for a virtual machine in the vCenter Server inventory. Which two statements indicate likely causes of the problem? (Choose two.)A . The virtual machine is powered off.B . The host containing the virtual machine is disconnected from vCenter...

November 7, 2018 No Comments READ MORE +

Which three methods can be used to create user groups in vRealize Operations? (Choose three.)

Which three methods can be used to create user groups in vRealize Operations? (Choose three.)A . The import user groups dialog in Access ControlB . The import user groups dialog in Authentication SourcesC . Add groups dialog in Access ControlD . The vRealize Operations product APIE . The import user...

November 7, 2018 No Comments READ MORE +

What is called the percentage at which the False Rejection Rate equals the False Acceptance Rate?

What is called the percentage at which the False Rejection Rate equals the False Acceptance Rate?A .  False Rejection Rate (FRR) or Type I ErrorB .  False Acceptance Rate (FAR) or Type II ErrorC .  Crossover Error Rate (CER)D .  Failure to enroll rate (FTE or FER)View AnswerAnswer: C Explanation: The...

November 7, 2018 No Comments READ MORE +

How should you offer bulk discounts?

You work for an organization that uses Microsoft Dynamics 365 to quote prices to customers. The organization wants to incentivize bulk purchases by offering discounts on purchases of larger quantities. How should you offer bulk discounts?A . Create a Discount List and associate it with the Price List Item directly.B...

November 7, 2018 No Comments READ MORE +

What is a key benefit of a layered network design?

What is a key benefit of a layered network design?A . cost savingsB . increased securityC . increased flexibilityD . decreased broadcastView AnswerAnswer: C

November 7, 2018 No Comments READ MORE +

A user reports difficulties connecting a PC to a wired network. The PC connects to an IP phone, which is working correctly. A network technician can verify that other devices successfully connect to the phone. At which of the following layers of the OSI model is the problem MOST likely located?

A user reports difficulties connecting a PC to a wired network. The PC connects to an IP phone, which is working correctly. A network technician can verify that other devices successfully connect to the phone. At which of the following layers of the OSI model is the problem MOST likely...

November 7, 2018 No Comments READ MORE +

Which two statements about Telnet access to the ASA are true? (Choose two).

Which two statements about Telnet access to the ASA are true? (Choose two).A . You may VPN to the lowest security interface to telnet to an inside interface.B . You must configure an AAA server to enable Telnet.C . You can access all interfaces on an ASA using Telnet.D ....

November 7, 2018 No Comments READ MORE +

Which tool should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. You create a security template named Template1 by using the security template snap-in. You need to apply Template1 to Server2. Which tool should you use? A....

November 7, 2018 No Comments READ MORE +