Which Cisco Unified Communications Manager partition will be associated with a directory URI that is configured for an end user with a primary extension?

Which Cisco Unified Communications Manager partition will be associated with a directory URI that is configured for an end user with a primary extension?A . nullB . noneC . directory URID . defaultE . any partition that the Cisco Unified Communications Manager administrator desiresView AnswerAnswer: C Explanation: Cisco Unified Communications...

October 15, 2018 No Comments READ MORE +

What would be the destination Layer 2 address in the frame header for a frame that is being forwarded by Dubai to the host address of 172.30.4.4?

What would be the destination Layer 2 address in the frame header for a frame that is being forwarded by Dubai to the host address of 172.30.4.4? A . 825B . 230C . 694D . 387View AnswerAnswer: C Explanation: According to command output 172.30.4.4 is using the 694 dlci value....

October 15, 2018 No Comments READ MORE +

What are two possible ways to achieve this goal?

You manage a set of virtual machines (VMs) deployed to the cloud service named fabrikamVM. You configure auto scaling according to the following parameters: * With an instance range of two to six instances * To maintain CPU usage between 70 and 80 percent * To scale up one instance...

October 15, 2018 No Comments READ MORE +

In which portion of the frame is the 802.1q header found?

In which portion of the frame is the 802.1q header found?A . within the Ethernet headerB . within the Ethernet payloadC . within the Ethernet FCSD . within the Ethernet source MAC addressView AnswerAnswer: A Explanation: Frame format Insertion of 802.1Q tag in an Ethernet frame 802.1Q does not encapsulate...

October 15, 2018 No Comments READ MORE +

Which authorization method should you recommend?

HOTSPOT You are building an application that will run in a virtual machine (VM). The application will use Managed Service Identity (MSI). The application uses Azure Key Vault, Azure SQL Database, and Azure Cosmos DB. You need to ensure the application can use secure credentials to access these services. Which...

October 15, 2018 No Comments READ MORE +

What should you do?

You administer Windows 10 Enterprise client computers in your company network. You change settings on a reference computer by using the Windows Firewall with Advanced Security tool. You want to apply the same settings to other computers. You need to save the Windows Firewall with Advanced Security configuration settings from...

October 15, 2018 No Comments READ MORE +

Which solution satisfies the client's needs?

A client has 2 large file storage environments with data that is rarely accessed. The client wants a cost-efficient solution that applies minimum changes to applications while maintaining access to all data in the current environment. Which solution satisfies the client's needs?A . Extend the storage capacity using an IBM...

October 15, 2018 No Comments READ MORE +

Who is responsible for ensuring that the request fulfillment process is being performed according to the agreed and documented standard?

Who is responsible for ensuring that the request fulfillment process is being performed according to the agreed and documented standard?A . The IT directorB . The process ownerC . The service ownerD . The customerView AnswerAnswer: B

October 15, 2018 No Comments READ MORE +

Which two benefits are derived from a Cisco Meraki cloud-managed network? (Choose two )

Which two benefits are derived from a Cisco Meraki cloud-managed network? (Choose two )A . enhanced visibility and monitoringB . enriched virtualization capabilitiesC . enhanced troubleshooting via CLID . walled-garden and sandbox safety measuresE . centralized management and controlView AnswerAnswer: AE

October 15, 2018 No Comments READ MORE +

As a best practice, where should firewall services and STP root guard be important topology?

Network architect is recommending that a customer move from a three-tier campus LAN topology to a two-tier topology that routes traffic distribution layer provides firewall services and STP root guard. As a best practice, where should firewall services and STP root guard be important topology?A . These security features should...

October 15, 2018 No Comments READ MORE +