Which of the following would typically require the use of a punchdown tool to connect a cable to the network switch?
Which of the following would typically require the use of a punchdown tool to connect a cable to the network switch?A . RouterB . RepeaterC . Patch panelD . PoE injectorView AnswerAnswer: C
What should you do?
Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012 R2. In a remote site, a support technician installs a server named DC10 that runs Windows Server 2012 R2. DC10 is currently a member of a workgroup. You plan to promote DC10 to a...
Which tab should you use to configure the required CDP entry?
HOTSPOT Your company has a primary data center and a disaster recovery data center. The network contains an Active Directory domain named contoso.com. The domain contains a server named that runs Windows Server 2012 R2. Server1 is located in the primary data center. Server1 has an enterprise root certification authority...
What is the default amount by which the hot standby priority for the router is decremented or incremented when the interface goes down or comes back up?
What is the default amount by which the hot standby priority for the router is decremented or incremented when the interface goes down or comes back up?A . 1B . 5C . 10D . 15View AnswerAnswer: C Explanation: The standby track interface configuration command ties the router hot standby priority...
What should you set up?
You need to give Great Britain division access to the UKSales application What should you set up?A . a border Gateway protocolB . a multi-tenant client-to-site VPN gatewayC . a web application proxyD . a multi tenant Remote Access VPN gatewayView AnswerAnswer: C Explanation: In the section sales department UK...
What should you do?
Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and litwareinc.com. Your company recently deployed DirectAccess for the members of a group named DA_Computers. All client computers are members of DA_Computers. You discover that DirectAccess clients can access the resources located in the...
Based on the MAC Caching service information shown, which statement about the guests’ MAC address is accurate?
Refer to the exhibit. A guest connects to the Guest SSID and authenticates successfully using the guest.php web login page. Based on the MAC Caching service information shown, which statement about the guests’ MAC address is accurate?A . It will be visible in the Guest User Repository with Unknown StatusB...
Which inquiry should you use?
You need to perform an audit to identify out of balance payment transactions at a physical store. Which inquiry should you use?A . Retail store transactionsB . Posted statementsC . Retail salesD . Online store transactionsView AnswerAnswer: B
What are four characteristics of a NAS LIF? (Choose four.)
What are four characteristics of a NAS LIF? (Choose four.)A . It has a logical interface connection.B . It can be associated with an interface group (ifgrp)C . It can be associated with a Fibre Channel port.D . It can be associated with an IP address.E . It can be...
Which of the following would be used to prove the existence of vulnerabilities on a network?
Which of the following would be used to prove the existence of vulnerabilities on a network?A . Penetration testingB . Vulnerability assessmentC . Business impact analysisD . Risk assessmentView AnswerAnswer: A