Which two design solutions can be applied to ensure that your access routers will be able to reach all devices in your network?
You work as a network designer for a company that is replacing their Frame Relay WAN with an MPLS VPN service, where the PE-to-CE routing protocol is BGP. The company has 3000 routes in their distribution routers, and they would like to advertise their access routers through the MPLS network....
Which command is used to enable IPv6 on Security Gateway?
Which command is used to enable IPv6 on Security Gateway?A . set ipv6-state onB . add ipv6 interface onC . set ipv6-enable onD . set ipv6-state enabledView AnswerAnswer: A
On which column in the Employee table should you create a self-reference foreign key constraint?
You administer a Microsoft SQL Server 2012 database. The database contains a table named Employee. Part of the Employee table is shown in the exhibit. (Click the Exhibit button.) Unless stated above, no columns in the Employee table reference other tables. Confidential information about the employees is stored in a...
Which devices can communicate with each other at Layer 2?
Refer to the exhibit. Exhibit 1. Exhibit 2. Which devices can communicate with each other at Layer 2?A . Devices 1 and 2 can communicate at Layer 2; Devices 3 and 4 can communicate at Layer 2.B . Devices 2 and 3 can communicate at Layer 2.C . Devices 1...
Which of the following are true for CIFS? (Choose TWO correct answers.)
Which of the following are true for CIFS? (Choose TWO correct answers.)A . Filenames can be in any character set.B . Filenames can have a maximum length of 127 characters.C . Unlike SMB, CIFS is not optimized for slow network connections.D . Opportunistic Locks are supported.View AnswerAnswer: A, D
What best describes server virtualization?
What best describes server virtualization?A . Server virtualization is the masking of server resources (including the number and identity of individual physical servers, processors, and operating systems) from server users.B . System virtualization is the use of software to allow a piece of hardware to run multiple operating system images...
drops below acceptable limits?
Which process is involved in monitoring an IT service and detecting when the performance drops below acceptable limits?A . Service asset and configuration managementB . Event managementC . Service catalogue managementD . Problem managementView AnswerAnswer: B
On the Cisco ME 3400 switch, spanning tree is enabled by default on which type of switch port?
On the Cisco ME 3400 switch, spanning tree is enabled by default on which type of switch port?A . UNIB . ENIC . NNID . ENI and NNIE . UNI, ENI, and NNIView AnswerAnswer: C
On a VoIP solution design, which option shows one-way latency, packet loss, and jitter measurements that ensure acceptable voice quality?
On a VoIP solution design, which option shows one-way latency, packet loss, and jitter measurements that ensure acceptable voice quality?A . Latency: 110 ms Packet loss: 1% Jitter: 40 msB . Latency: 130 ms Packet loss: 0.5% Jitter: 30 msC . Latency: 150 ms Packet loss: 1.25% Jitter: 20 msD...
What should you do on Server1?
Your network contains an Active Directory domain named contoso.com. The network contains 500 client computers that run Windows 8. All of the client computers connect to the Internet by using a web proxy. You deploy a server named Server1 that runs Windows Server 2012 R2. Server1 has the DNS Server...