What is the first step you perform to configure an SNMPv3 user?

What is the first step you perform to configure an SNMPv3 user?A . Configure server traps.B . Configure the server group.C . Configure the server host.D . Configure the remote engine IView AnswerAnswer: B Explanation: The first task in configuring SNMPv3 is to define a view. To simplify things, we'll...

October 12, 2018 No Comments READ MORE +

When implementing CSC services, which two methods can be used to exchange label information between the downstream CSC customer carrier and the CSC backbone carrier? (Choose two.)

When implementing CSC services, which two methods can be used to exchange label information between the downstream CSC customer carrier and the CSC backbone carrier? (Choose two.)A . using MP-BGPB . using RSVPC . using IGP and LDPD . using back-to-back VRFE . using front VRF and internal VRFView AnswerAnswer:...

October 12, 2018 No Comments READ MORE +

When a call between two HQ users was being conferenced with a remote user at the BR site, the conference failed. Which configuration would be needed to solve the problem?

Refer to the exhibit. When a call between two HQ users was being conferenced with a remote user at the BR site, the conference failed. Which configuration would be needed to solve the problem?A .  The BR_MRG must contain the transcoder device. The BR_MRGL must be assigned to the BR...

October 12, 2018 No Comments READ MORE +

An administrator has several expired backup sets that are still showing under the configured Disk Storage. Which two reasons will prevent the expired backup sets from being deleted? (Select two.)

An administrator has several expired backup sets that are still showing under the configured Disk Storage. Which two reasons will prevent the expired backup sets from being deleted? (Select two.)A . There are other unexpired backup sets that are dependent on them.B . The expired backup sets need to be...

October 12, 2018 No Comments READ MORE +

Which of the following computer design approaches is based on the fact that in earlier technologies, the instruction fetch was the longest part of the cycle?

Which of the following computer design approaches is based on the fact that in earlier technologies, the instruction fetch was the longest part of the cycle?A .  PipeliningB .  Reduced Instruction Set Computers (RISC)C .  Complex Instruction Set Computers (CISC)D .  Scalar processorsView AnswerAnswer: C Explanation: Complex Instruction Set Computer...

October 12, 2018 No Comments READ MORE +

This question requires that you evaluate the underlined text to determine if it is correct.

This question requires that you evaluate the underlined text to determine if it is correct. An organization implements a SAM program based on the ISO 19770-1 specification. The organization conducts a review of inventory data once each calendar year and reconciles data from multiple sources. The organization has achieved Tier...

October 12, 2018 No Comments READ MORE +

What device(s) would the engineer specify the EAP type on?

An engineer wants to setup WPA2 Enterprise using EAP-TLS and a remote RADIUS server. What device(s) would the engineer specify the EAP type on?A . the supplicant and authentication serverB . the supplicant and authenticatorC . the authenticator and authentication serverD . the supplicant onlyE . the authentication server onlyView...

October 12, 2018 No Comments READ MORE +

How many web requests does Talos process per month?

How many web requests does Talos process per month?A . 1.5 millionB . 100,000C . 130 billionD . 130 millionView AnswerAnswer: C

October 12, 2018 No Comments READ MORE +

Which three actions should you perform?

DRAG DROP Your network contains an Active Directory forest named contoso.com. All domain controllers run Windows Server 2008 R2. The schema is upgraded to Windows Server 2012 R2. Contoso.com contains two servers. The servers are configured as shown in the following table. Server1 and Server2 host a load-balanced application pool...

October 12, 2018 No Comments READ MORE +

Which two statements describe the operation of the CSMA/CD access method? (Choose two.)

Which two statements describe the operation of the CSMA/CD access method? (Choose two.)A . In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.B . In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.C . The use of hubs to...

October 12, 2018 No Comments READ MORE +