Which two choices are VMware-recommended ESXi syslog configurations? (Choose two.)
Which two choices are VMware-recommended ESXi syslog configurations? (Choose two.)A . Remote logging to a central host.B . Store logs in the in-memory filesystem.C . Configure persistent logging to a datastore.D . Configure logging to the vCenter Server.View AnswerAnswer: A,C Explanation: Take the following measures to increase the security of...
Which backup should you perform every two hours?
You administer a Microsoft SQL Server 2014 instance that contains a financial database hosted on a storage area network (SAN). The financial database has the following characteristics: The database is continually modified by users during business hours from Monday through Friday between 09:00 hours and 17:00 hours. Five percent of...
How should you write the code?
DRAG DROP You are developing an online shopping application that accepts credit cards for payment. If the credit card number is invalid, the application must: Generate an error Assign "200" to the error number Assign "Invalid" to the error description You need to write the code that meets the requirements....
Which two technologies use the ENCRYPT_MAC configuration parameter to control the level of message authentication code (MAC) generation? (Choose two.)
Which two technologies use the ENCRYPT_MAC configuration parameter to control the level of message authentication code (MAC) generation? (Choose two.)A . On-disk encryptionB . Enterprise ReplicationC . Column level encryptionD . High-Availability Data ReplicationE . Server-to-server distributed query communicationView AnswerAnswer: B,D
Which of the following attacks specifically impact data availability?
Which of the following attacks specifically impact data availability?A . DDoSB . TrojanC . MITMD . RootkitView AnswerAnswer: A
Referring to the exhibit, which path will traffic from R6 take to reach R1?
Click the Exhibit button. Referring to the exhibit, which path will traffic from R6 take to reach R1?A . R6 > R4 > R2 > R1B . R6 > R4 > R2 > R3 > R1C . R6 > R5 > R3 > R1D . R6 > R5 > R3...
What should you use?
You are creating a SQL Server Integration Services (SSIS) package that implements a Type 3 Slowly Changing Dimension (SCD). You need to add a task or component to the package that allows you to implement the SCD logic. What should you use?A . a Data Conversion componentB . an Execute...
Which feature of vSphere networking protects hosts from losing connection to vCenter Server as a result of misconfiguration of the management network?
Which feature of vSphere networking protects hosts from losing connection to vCenter Server as a result of misconfiguration of the management network?A . NIC TeamingB . Private VLANC . RollbackD . Health CheckView AnswerAnswer: C Explanation: By rolling configuration changes back, vSphere protects hosts from losing connection to vCenter Server...
In STP, assuming that all switches are configured the same priority, switch1 MAC address is 00-e04c-00-00-40, switch 2 MAC address is 00-e0-fc-00-00-10, switch3 MAC address is 00-e0-fc-00-00-20, switch4 MAC address is 00-e0-fc-00-00-80, the root switch should be ( ).
In STP, assuming that all switches are configured the same priority, switch1 MAC address is 00-e04c-00-00-40, switch 2 MAC address is 00-e0-fc-00-00-10, switch3 MAC address is 00-e0-fc-00-00-20, switch4 MAC address is 00-e0-fc-00-00-80, the root switch should be ( ).A . Switch 1B . Switch 2C . Switch 3D . Switch...
Which of the following settings should be configured to achieve this outcome?
A user wants to reduce the amount of paper consumed on a multi-function printer. Which of the following settings should be configured to achieve this outcome?A . OrientationB . DuplexC . CollateD . Economy inkView AnswerAnswer: B