Which Cisco Unified Communications Manager partition will be associated with a directory URI that is configured for an end user with a primary extension?
Which Cisco Unified Communications Manager partition will be associated with a directory URI that is configured for an end user with a primary extension?A . nullB . noneC . directory URID . defaultE . any partition that the Cisco Unified Communications Manager administrator desiresView AnswerAnswer: C Explanation: Cisco Unified Communications...
What would be the destination Layer 2 address in the frame header for a frame that is being forwarded by Dubai to the host address of 172.30.4.4?
What would be the destination Layer 2 address in the frame header for a frame that is being forwarded by Dubai to the host address of 172.30.4.4? A . 825B . 230C . 694D . 387View AnswerAnswer: C Explanation: According to command output 172.30.4.4 is using the 694 dlci value....
What are two possible ways to achieve this goal?
You manage a set of virtual machines (VMs) deployed to the cloud service named fabrikamVM. You configure auto scaling according to the following parameters: * With an instance range of two to six instances * To maintain CPU usage between 70 and 80 percent * To scale up one instance...
In which portion of the frame is the 802.1q header found?
In which portion of the frame is the 802.1q header found?A . within the Ethernet headerB . within the Ethernet payloadC . within the Ethernet FCSD . within the Ethernet source MAC addressView AnswerAnswer: A Explanation: Frame format Insertion of 802.1Q tag in an Ethernet frame 802.1Q does not encapsulate...
Which authorization method should you recommend?
HOTSPOT You are building an application that will run in a virtual machine (VM). The application will use Managed Service Identity (MSI). The application uses Azure Key Vault, Azure SQL Database, and Azure Cosmos DB. You need to ensure the application can use secure credentials to access these services. Which...
What should you do?
You administer Windows 10 Enterprise client computers in your company network. You change settings on a reference computer by using the Windows Firewall with Advanced Security tool. You want to apply the same settings to other computers. You need to save the Windows Firewall with Advanced Security configuration settings from...
Which solution satisfies the client's needs?
A client has 2 large file storage environments with data that is rarely accessed. The client wants a cost-efficient solution that applies minimum changes to applications while maintaining access to all data in the current environment. Which solution satisfies the client's needs?A . Extend the storage capacity using an IBM...
Who is responsible for ensuring that the request fulfillment process is being performed according to the agreed and documented standard?
Who is responsible for ensuring that the request fulfillment process is being performed according to the agreed and documented standard?A . The IT directorB . The process ownerC . The service ownerD . The customerView AnswerAnswer: B
Which two benefits are derived from a Cisco Meraki cloud-managed network? (Choose two )
Which two benefits are derived from a Cisco Meraki cloud-managed network? (Choose two )A . enhanced visibility and monitoringB . enriched virtualization capabilitiesC . enhanced troubleshooting via CLID . walled-garden and sandbox safety measuresE . centralized management and controlView AnswerAnswer: AE
As a best practice, where should firewall services and STP root guard be important topology?
Network architect is recommending that a customer move from a three-tier campus LAN topology to a two-tier topology that routes traffic distribution layer provides firewall services and STP root guard. As a best practice, where should firewall services and STP root guard be important topology?A . These security features should...