Which of the following is NOT a recognized example of a service provider type within the ITIL framework?

Which of the following is NOT a recognized example of a service provider type within the ITIL framework?A . InternalB . ExternalC . Service deskD . Shared services unitView AnswerAnswer: C

October 18, 2018 No Comments READ MORE +

Which tool should you use?

Your network contains an Active Directory forest named contoso.com. All servers run Windows Server 2012 R2. You need to create a custom Active Directory application partition. Which tool should you use?A . EseutilB . DsaddC . DsmodD . NtdsutilView AnswerAnswer: D Explanation: * To create or delete an application directory...

October 18, 2018 No Comments READ MORE +

After removing a VMM domain from an EPG, you discover that the associated virtual port groups remain in the VMware vCenter configuration. What causes the virtual port groups to persist in the configuration?

After removing a VMM domain from an EPG, you discover that the associated virtual port groups remain in the VMware vCenter configuration. What causes the virtual port groups to persist in the configuration?A . The MAC addresses that are learned by the ports of the spine switches are incorrect.B ....

October 18, 2018 No Comments READ MORE +

An effective information security policy should not have which of the following characteristic?

An effective information security policy should not have which of the following characteristic?A .  Include separation of dutiesB .  Be designed with a short- to mid-term focusC .  Be understandable and supported by all stakeholdersD .  Specify areas of responsibility and authorityView AnswerAnswer: B Explanation: An effective information security policy should...

October 18, 2018 No Comments READ MORE +

What should you identify?

Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and child.contoso.com and two sites named Site1 and Site2. The domains and the sites are configured as shown in following table. When the link between Site1 and Site2 fails, users fail to log on...

October 18, 2018 No Comments READ MORE +

Which recovery model should the database use?

You administer a Microsoft SQL Server 2012 instance that contains a financial database hosted on a storage area network (SAN). The financial database has the following characteristics: A data file of 2 terabytes is located on a dedicated LUN (drive D). A transaction log of 10 GB is located on...

October 18, 2018 No Comments READ MORE +

A security administrator is performing VDI traffic data collection on a virtual server which migrates from one host to another. While reviewing the data collected by the protocol analyzer, the security administrator notices that sensitive data is present in the packet capture. Which of the following should the security administrator recommend to ensure the confidentiality of sensitive information during live VM migration, while minimizing latency issues?

A security administrator is performing VDI traffic data collection on a virtual server which migrates from one host to another. While reviewing the data collected by the protocol analyzer, the security administrator notices that sensitive data is present in the packet capture. Which of the following should the security administrator...

October 18, 2018 No Comments READ MORE +

Which of the following is the act of performing tests and evaluations to test a system's security level to see if it complies with the design specifications and security requirements?

Which of the following is the act of performing tests and evaluations to test a system's security level to see if it complies with the design specifications and security requirements?A .  ValidationB .  VerificationC .  AssessmentD .  AccuracyView AnswerAnswer: B Explanation: Verification vs. Validation: Verification determines if the product accurately represents...

October 18, 2018 No Comments READ MORE +

Which two statements are true?

Refer to the exhibit. Which two statements are true? (Choose two)A . The option failover is enabled on all the interfacesB . Interface vfc 1871 is pinned to fc interface 1/32 in fabric interconnect BC . Server 7 in chassis 4 has been associated with profile circuitD . To check...

October 18, 2018 No Comments READ MORE +

What is the network address for the 10.13.147.100/19 host?

What is the network address for the 10.13.147.100/19 host?A . 10.13.128.0B . 10.13.147.0C . 10.13.0.0D . 10.13.100.0View AnswerAnswer: A

October 18, 2018 No Comments READ MORE +