Which feature in vSphere 6.5 allows the backing storage to automatically reclaim the freed blocks?
In vSphere 6.5, a virtual machine is thinly-provisioned on a VMFS6 datastore. The administrator deleted a large file within the guest OS. The freed blocks in the datastore are no longer needed by the VM. Which feature in vSphere 6.5 allows the backing storage to automatically reclaim the freed blocks?A...
Under what circumstance would you enable LEARN as the Action on a firewall policy?
Under what circumstance would you enable LEARN as the Action on a firewall policy?A . You want FortiGate to compile security feature activity from various security-related logs, such as virus and attack logs.B . You want FortiGate to monitor a specific security profile in a firewall policy, and provide recommendations...
Which multicast group range is reserved for SSM?
Which multicast group range is reserved for SSM?A . 224.0.0.0/8B . 225.0.0.0/8C . 232.0.0.0/8D . 239.0.0.0/8View AnswerAnswer: C Explanation: PIM-SSM Operations PIM in Source Specific Multicast operation uses information found on source addresses for a multicast group provided by receivers and performs source filtering on traffic. - By default, PIM-SSM...
Which of the following should the technician check?
A technician is asked to troubleshoot a server that constantly reboots. There are no error messages displayed on the server. Which of the following should the technician check?A . Cooling failureB . Cable mismatchC . BIOS driver failureD . Port conflictView AnswerAnswer: A
On the PE, which two stateme s are correct regarding the (192.168.156.60 224.1.1.1) entry?
On the PE, which two stateme s are correct regarding the (192.168.156.60 224.1.1.1) entry? (Choose two )A . The RPF neighbor points towards the RPB . The RPF neighbor is reachable overthe GiO/O/O/1 interfaceC . The OIL contains the GiO/O/O/O interfaceD . The IIL is NullView AnswerAnswer: A C Explanation: #show ip mroute
What should you configure from User Configuration in GPO1?
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. All client computers run Windows 8 Enterprise. DC1 contains a Group Policy object (GPO) named GPO1. You need to deploy a VPN connection to all users. What...
A port on an ArubaOS switch has its default spanning tree settings. When is the port defined as a spanning tree edge port?
A port on an ArubaOS switch has its default spanning tree settings. When is the port defined as a spanning tree edge port?A . when the switch and the connected switch run MSTP but have different region settingsB . when the switch runs MSTP but the connected switch runs RSTPC...
Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?
A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer’s software and hardware without the owner’s permission. Their intention can either be to simply gain knowledge or to illegally make changes. Which of the following class of hacker refers to an individual who...
Which event should you select?
You administer a Microsoft SQL Server 2012 database. Users report that a billing application becomes unresponsive during busy times of the day. While investigating, you notice large number of processes taking or waiting for table locks. You suspect that SQL Server is assigning stronger locks to queries. You start a...
What should you do?
Your network contains two servers named HV1 and HV2. Both servers run Windows Server 2012 R2 and have the Hyper-V server role installed. HV1 hosts 25 virtual machines. The virtual machine configuration files and the virtual hard disks are stored in D:VM. You shut down all of the virtual machines...