On Cisco routers, which three methods can be used to map traffic into the MPLS traffic engineering tunnel? (Choose three.)

On Cisco routers, which three methods can be used to map traffic into the MPLS traffic engineering tunnel? (Choose three.)A . on-demand routingB . static routingC . optimized edge routingD . policy-based routingE . autorouteView AnswerAnswer: B,D,E

November 4, 2018 No Comments READ MORE +

Which of the following parameters can be used in the file DB_CONFIG? (Select TWO correct answers.)

Which of the following parameters can be used in the file DB_CONFIG? (Select TWO correct answers.)A . set_cachesizeB . set_cachepathC . set_db_typeD . set_db_pathE . set_lg_maxView AnswerAnswer: A, E

November 4, 2018 No Comments READ MORE +

A network administrator logs in to the HP VAN SDN Controller, which is configured to use a local Keystone server. What happens if the administrator's login credentials are valid?

A network administrator logs in to the HP VAN SDN Controller, which is configured to use a local Keystone server. What happens if the administrator's login credentials are valid?A . The Keystone server sends both the controller and the administrator a token, which the administrator's client includes with each request...

November 4, 2018 No Comments READ MORE +

Which of the following actions could the administrator take to improve the performance of data transfers over iSCSI switches?

An administrator has a virtualization environment that includes a vSAN and iSCSI switching. Which of the following actions could the administrator take to improve the performance of data transfers over iSCSI switches?A . The administrator should configure the switch ports to auto-negotiate the proper Ethernet settings.B . The administrator should...

November 4, 2018 No Comments READ MORE +

Where do you configure the region for a group of devices?

Where do you configure the region for a group of devices?A . Common device profile.B . Device defaults.C . Common device configuration.D . Common phone profile.E . Device pool.View AnswerAnswer: E

November 4, 2018 No Comments READ MORE +

Which scenario requires a package rebuild?

You manage package deployments for a Microsoft Dynamics 365 Retail environment, and you need to determine if a package rebuild is necessary. Which scenario requires a package rebuild?A . You want to re-run a build due to warnings that appear in the Error List pane concerning best practices.B . You...

November 4, 2018 No Comments READ MORE +

In WDS peer-to-peer network, the backbone link between Root AP and Leaf AP connected by 5GHz frequency band, the frequency band of Root AP is 149, so which frequency band should be picked of Leaf AP()?

In WDS peer-to-peer network, the backbone link between Root AP and Leaf AP connected by 5GHz frequency band, the frequency band of Root AP is 149, so which frequency band should be picked of Leaf AP()?A . 149B . 153C . 157D . In addition to 149View AnswerAnswer: A

November 4, 2018 No Comments READ MORE +

What are the primary attack methods of VLAN hopping? (Choose two.)

What are the primary attack methods of VLAN hopping? (Choose two.)A . VoIP hoppingB . Switch spoofingC . CAM-table overflowD . Double taggingView AnswerAnswer: B,D

November 4, 2018 No Comments READ MORE +

What should you do from Hyper-V Manager?

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 and Server2 have the Hyper-V server role installed.Server1 and Server2 are configured as Hyper-V replicas of each other. Server2 hosts a virtual machine named VM5. VM5 is replicated to Server1. You need to verify...

November 4, 2018 No Comments READ MORE +

During the U1900 operation, the MTU board supports hot swap.

During the U1900 operation, the MTU board supports hot swap.A . TRUEB . FALSEView AnswerAnswer: A

November 4, 2018 No Comments READ MORE +