What should you do?

A user named User1 has a laptop that runs Windows 10 Pro. At home, User1 connects to the home network by using an Ethernet connection User1 reports that he sometimes exceeds his Internet data limit. You need to prevent the laptop from downloading Windows updates automatically. What should you do?A...

October 20, 2018 No Comments READ MORE +

Why did not connect?

When you attempt to open a virtual machine console from the vSphere Web Client, the console does not connect. The following error message appears: Why did not connect?A . Port 443 is in use.B . Port 9443 is in use.C . Port 8443 is in use.D . Port 22443 is...

October 20, 2018 No Comments READ MORE +

You need to use the Baseline2 fields to calculate Variance at Completion (VAC).You have already set Baseline2.What should you do?

You manage a project by using Project Standard 2013. You need to use the Baseline2 fields to calculate Variance at Completion (VAC).You have already set Baseline2.What should you do?A . Enter physical percent complete for the tasks that have actual values.Set the Baseline to the Baseline2, and reschedule uncompleted work based on the status...

October 20, 2018 No Comments READ MORE +

According to this show output, what are sticky MAC addresses?

Refer to the exhibit. According to this show output, what are sticky MAC addresses?A . Dynamically learned MAC addresses on the port that are stored in the MAC address table and also in the start-up configurationB . Statically configured MAC addresses on the port that are stored in the MAC...

October 20, 2018 No Comments READ MORE +

Which virtual machine setting should you configure for VM2?

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table. You install Windows Server 2012 R2 on VM2 by using...

October 20, 2018 No Comments READ MORE +

What is the effect of the given command sequence?

Refer to the exhibit. What is the effect of the given command sequence?A . It configures IKE Phase 1.B . It configures a site-to-site VPN tunnel.C . It configures a crypto policy with a key size of 14400.D . It configures IPSec Phase 2.View AnswerAnswer: A

October 20, 2018 No Comments READ MORE +

How does a GDOI-based VPN eliminate the additional tunnel and routing overhead found in DMVPN?

You are designing a multisite VPN solution for a customer and you are concerned with the additional overhead of point-to-point tunnels and the associated overlay routing with DMVPN. How does a GDOI-based VPN eliminate the additional tunnel and routing overhead found in DMVPN?A . The GDOI-based VPN requires overlaying a...

October 20, 2018 No Comments READ MORE +

What should you do?

You have Windows Server 2012 R2 installation media that contains a file named Install.wim. You need to identify the permissions of the mounted images in Install.wim. What should you do?A . Run dism.exe and specify the /get-mountedwiminfo parameter.B . Run imagex.exe and specify the /verify parameter.C . Run imagex.exe and...

October 20, 2018 No Comments READ MORE +

Which of the following questions is less likely to help in assessing identification and authentication controls?

Which of the following questions is less likely to help in assessing identification and authentication controls?A .  Is a current list maintained and approved of authorized users and their access?B .  Are passwords changed at least every ninety days or earlier if needed?C .  Are inactive user identifications disabled after...

October 20, 2018 No Comments READ MORE +

What should you configure?

General Overview You are the Senior Database Administrator (DBA) for a manufacturing company named Fairstone Manufacturing. Fairstone Manufacturing is based in the New York area. The company has two offices: a main office in the city and a branch office just outside the city. The company has four factories where...

October 20, 2018 No Comments READ MORE +