What should you back up?
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The network contains a System Center 2012 R2 Data Protection Manager (DPM) deployment. The domain contains six servers. The servers are configured as shown in the following table. You install System Center 2012 R2...
Which lines of code should you use?
HOTSPOT You are developing an airline reservation website by using HTML5 and JavaScript. A page on the site allows users to enter departure and destination airport information and search for tickets. You have the following requirements: • Users must be able to save information in the application about their favorite...
What is the minimum version of DOCSIS that will support IPv6?
What is the minimum version of DOCSIS that will support IPv6?A . Version 1B . Version 2C . Version 3D . Version 3.1View AnswerAnswer: B
Which three statements are considered best practice when configuring an NFS appliance port on Cisco UCS? (Choose three)
Which three statements are considered best practice when configuring an NFS appliance port on Cisco UCS? (Choose three)A . If storage and servers are located in the same subnets, then the appliance port VLANs should be allowed on the upstream switchB . Cisco UCS supports Static and Link Aggregation Control...
Which command configures the SNMP server group1 to enable authentication for members of the access list east?
Which command configures the SNMP server group1 to enable authentication for members of the access list east?A . snmp-server group group1 v3 auth access eastB . snmp-server group1 v3 auth access eastC . snmp-server group group1 v3 eastD . snmp-server group1 v3 east accessView AnswerAnswer: A
The three classic ways of authenticating yourself to the computer security software are: something you know, something you have, and something:
The three classic ways of authenticating yourself to the computer security software are: something you know, something you have, and something:A . you need.B . you read.C . you are.D . you do.View AnswerAnswer: C Explanation: Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation.
Which two options can be used by a threat actor to determine the role of a server? (Choose two.)
Which two options can be used by a threat actor to determine the role of a server? (Choose two.)A . PCAPB . tracertC . running processesD . hard drive configurationE . applicationsView AnswerAnswer: CE
Which type of DNS record should you modify?
You have a DNS server named DN51 that runs Windows Server 2012 R2. On DNS1, you create a standard primary DNS zone named adatum.com. You need to change the frequency that secondary name servers will replicate the zone from DNS1. Which type of DNS record should you modify?A . Name...
Which two inbound TCP ports should you open on the firewall?
Your network contains an Active Directory forest named contoso.com. The forest contains a member server named Server1 that runs Windows Server 2016. Server1 is located in the perimeter network. You install the Active Directory Federation Services server role on Server1. You create an Active Directory Federation Services (AD FS) farm...
Which two statements about WiMAX technology are true? (Choose two.)
Which two statements about WiMAX technology are true? (Choose two.)A . WiMAX is defined by 802.11i.B . Typically, fixed WiMAX networks have a higher-gain directional antenna installed near the client.C . WiMAX is capable of working as a long-range system over several miles.D . WiMAX works only for licensed frequencies.View...