Which permission or permissions should you choose?
DRAG DROP You administer a Microsoft SQL Server 2012 server along with a Windows Azure SQL Database database. For both servers, you need to grant users the ability to create logins and create databases. You need to determine which permission to grant users in each instance. Which permission or permissions...
Which of the following statements are true about route-based IPsec VPNs?
Which of the following statements are true about route-based IPsec VPNs? (Choose two.) Response:A . A virtual IPsec interface is automatically created after a phase 1 is added to the configurationB . They require firewall policies with the Action set to IPsecC . They support L2TP-over-IPsec tunnelsD . They can...
Which two choices are VMware Mirage App Layer Capture Steps? (Choose two.)
Which two choices are VMware Mirage App Layer Capture Steps? (Choose two.)A . Install layer driver.B . Adjust the INI file with an MSI=1 value.C . Prepare the Explanation: machine.D . Capture the Pre-install State.View AnswerAnswer: C,D Explanation: http://pubs.vmware.com/horizonmirage-44/index.jsp?topic=%2Fcom.vmware.horizonmirage.admin.doc%2FGUID-A6F9D2A4-3C42-4240-B4C6-61C3C3A15CFD.html
Which of these tools, without any options, provides the most information when performing DNS queries?
Which of these tools, without any options, provides the most information when performing DNS queries?A . digB . nslookupC . hostD . named-checkconfE . named-checkzoneView AnswerAnswer: A
Which option lists the Cisco Prime Service Catalog support approval guidelines?
Which option lists the Cisco Prime Service Catalog support approval guidelines?A . . Policy-based controls and approvals . User entitlement and role-based access control . Service lifecycle management . Financial and demand managementB . . Built in role-based security . Management of API integration . Financial and demand management...
Which area is reserved for the OSPF backbone?
Which area is reserved for the OSPF backbone?A . Area 0.0.0.0B . Area 1.1.1.1C . Area 2.2.2.2D . Area 3.3.3.3View AnswerAnswer: A
Which of the following BEST describes the BGP routing protocol?
Which of the following BEST describes the BGP routing protocol?A . distance vectorB . hybridC . staticD . link stateView AnswerAnswer: B
Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?
Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?A . “Encrypt” action in the Rule BaseB . Permanent TunnelsC . “VPN” column in the Rule BaseD . Configuration checkbox “Accept all encrypted traffic”View AnswerAnswer: A Explanation: Migrating from Traditional Mode to Simplified Mode To...
Which routing protocol is typically used to peer with an MPLS provider?
Which routing protocol is typically used to peer with an MPLS provider?A . RIPB . EIGRPC . IGPD . eBGPView AnswerAnswer: D
Which of the following phases of a system development life-cycle is most concerned with establishing a good security policy as the foundation for design?
Which of the following phases of a system development life-cycle is most concerned with establishing a good security policy as the foundation for design?A . Development/acquisitionB . ImplementationC . InitiationD . MaintenanceView AnswerAnswer: C Explanation: A security policy is an important document to develop while designing an information system. The...