Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?

Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?A . CentralB . CorporateC . FormalD . LocalView AnswerAnswer: D

October 24, 2018 No Comments READ MORE +

When using IBM API Connect built-in policies in Bluemix, what should users be aware of?

When using IBM API Connect built-in policies in Bluemix, what should users be aware of?A . Only Micro Gateway policies applyB . Only DataPower Gateway policies applyC . Only those policies that generate security tokens applyD . Only those policies that do not generate security tokens applyView AnswerAnswer: C Explanation:...

October 24, 2018 No Comments READ MORE +

Which of the following daemons are included in Samba 3? (Select THREE correct answers.)

Which of the following daemons are included in Samba 3? (Select THREE correct answers.)A . windB . nmbdC . winbinddD . sambaE . smbdView AnswerAnswer: B, C, E

October 24, 2018 No Comments READ MORE +

Which three statements about Cisco Discovery Protocol operations on a Cisco ME3400 switch are true? (Choose three.)

Which three statements about Cisco Discovery Protocol operations on a Cisco ME3400 switch are true? (Choose three.)A . Cisco Discovery Protocol is enabled by default on NNI ports.B . Cisco Discovery Protocol is enabled by default on all NNI, ENI, and UNI ports.C . Cisco Discovery Protocol is disabled by...

October 24, 2018 No Comments READ MORE +

Which two statements are true regarding trace options on Junos devices? (Choose two.)

Which two statements are true regarding trace options on Junos devices? (Choose two.)A . You can see the contents of the log file by entering the show log <filename> command.B . Trace options will send information to your screen automatically.C . Trace options are limited to one protocol at a...

October 24, 2018 No Comments READ MORE +

What is known as one-to-nearest addressing in IPv6?

What is known as one-to-nearest addressing in IPv6?A . global unicastB . anycastC . multicastD . unspecified addressView AnswerAnswer: B

October 24, 2018 No Comments READ MORE +

Which three techniques can be used to improve fault isolation in an enterprise network design? (Choose three.)

Which three techniques can be used to improve fault isolation in an enterprise network design? (Choose three.)A . aggregate routing information on an OSPF ABRB . fully meshed distribution layerC . Equal-Cost Multipath routingD . EIGRP query boundariesE . multiple IS-IS flooding domainsF . tuned Spanning Tree Protocol timersView AnswerAnswer:...

October 24, 2018 No Comments READ MORE +

What should you do?

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. A server named Server1 is configured to encrypt all traffic by using IPSec. You need to ensure that Server1 can respond to ping requests from computers that do not support IPSec. What should you...

October 24, 2018 No Comments READ MORE +

What should you do?

HOTSPOT You administer a Microsoft SQL Server 2012 database. The database contains a table that has the following definition: You want to export data from the table to a flat file by using the SQL Server Import and Export Wizard. You need to ensure that the following requirements are met:...

October 24, 2018 No Comments READ MORE +

Which two outcomes occur as a result of deactivating these price lists?

You are the sales manager for a company that utilizes Microsoft Dynamics 365. Your sales department offers seasonal pricing on many of its products by using price lists which are then deactivated at the close of each season, Which two outcomes occur as a result of deactivating these price lists?...

October 23, 2018 No Comments READ MORE +