Which cmdlet should you run?

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 contains a...

November 3, 2018 No Comments READ MORE +

A large enterprise acquires another company which uses antivirus from a different vendor. The CISO has requested that data feeds from the two different antivirus platforms be combined in a way that allows management to assess and rate the overall effectiveness of antivirus across the entire organization. Which of the following tools can BEST meet the CISO's requirement?

A large enterprise acquires another company which uses antivirus from a different vendor. The CISO has requested that data feeds from the two different antivirus platforms be combined in a way that allows management to assess and rate the overall effectiveness of antivirus across the entire organization. Which of the...

November 3, 2018 No Comments READ MORE +

What addresses will populate these packets as they are forwarded from Router1 to Router2?

Refer to the exhibit. Mary is sending an instant message to Robert. The message will be broken into a series of packets that will traverse all network devices. What addresses will populate these packets as they are forwarded from Router1 to Router2? A . Option AB . Option BC ....

November 3, 2018 No Comments READ MORE +

What should you do?

You have a server named Server1 that runs Windows Server 2012 R2. Server1 is backed up by using Windows Server Backup. The backup configuration is shown in the exhibit. (Click the Exhibit button.) You discover that only the last copy of the backup is maintained. You need to ensure that...

November 3, 2018 No Comments READ MORE +

Which identifier is used to describe the application or process that submitted a log message?

Which identifier is used to describe the application or process that submitted a log message?A . actionB . selectorC . priorityD . facilityView AnswerAnswer: D

November 3, 2018 No Comments READ MORE +

Assume that several variables have been configured already, which PowerShell command would you use to create a Nano Server which had the Hyper-V role, clustering, OEM Drivers and antimalware?

For Windows Server 2016, Nano Server is distributed on the physical media, where you will find a NanoServer folder; this contains a .wim image and a subfolder called Packages. It is these package files that you use to add server roles and features to the VHD image, which you then...

November 3, 2018 No Comments READ MORE +

In order to generate an individual log file for each of the machines connecting to a Samba server, which of the following statements must be used in the Samba configuration file?

In order to generate an individual log file for each of the machines connecting to a Samba server, which of the following statements must be used in the Samba configuration file?A . log file = /var/log/samba/log.%cB . log file = /var/log/samba/log.%MC . log file = /var/log/samba/log.%mD . log file =...

November 3, 2018 No Comments READ MORE +

What should you do?

You support Windows 10 Enterprise computers that are members of an Active Directory domain. Recently, several domain user accounts have been configured with super-mandatory user profiles. A user reports that she has lost all of her personal data after a computer restart. You need to configure the user’s computer to...

November 3, 2018 No Comments READ MORE +

Which IPv6 mechanism occurs between a provider edge router and the customer premises equipment router to allow an ISP to automate the process of assigning a block of IPv6 addresses to a customer for use within the customer network?

Which IPv6 mechanism occurs between a provider edge router and the customer premises equipment router to allow an ISP to automate the process of assigning a block of IPv6 addresses to a customer for use within the customer network?A . Router AdvertisementB . DHCPv6 Prefix DelegationC . DHCPv6 LiteD ....

November 3, 2018 No Comments READ MORE +

Which of the following are the ways in which a PKI entity applies for a local certificate from CA? (Multiple Choice)

Which of the following are the ways in which a PKI entity applies for a local certificate from CA? (Multiple Choice)A .  Online applicationB .  Local applicationC .  Network applicationD .  Offline applicationView AnswerAnswer: AD

November 3, 2018 No Comments READ MORE +