How can you accomplish this request?
A user is required to answer voicemail for two lines but would like them to be filtered to only one mailbox. How can you accomplish this request?A . Provide multiple mailboxes for one Cisco Unity Connection user.B . Add an alternate extension.C . Create a shared mailbox.D . Initiate interview...
The following description about Huawei OceanStor integrated backup solution, which is correct? (Multiple choice)
The following description about Huawei OceanStor integrated backup solution, which is correct? (Multiple choice)A . Designed for Small to Medium-sized Business (SMB) local solutions that support LAN-Base and LAN-Free backup.B . The integrated backup node adopts the Huawei RH2288H V3 server and integrates with the industry's leading backup software. The...
Which component must you install for the planned deployment?
You have an Active Directory domain that contains several Hyper-V hosts that run Windows Server 2016. You plan to deploy network virtualization and to centrally manage Datacenter Firewall policies. Which component must you install for the planned deployment?A . the Routing role serviceB . the Canary Network Diagnostics featureC ....
What step is required to configure an SSL VPN to access to an internal server using port forward mode?
What step is required to configure an SSL VPN to access to an internal server using port forward mode? Response:A . Configure the virtual IP addresses to be assigned to the SSL VPN users.B . Install FortiClient SSL VPN clientC . Create a SSL VPN realm reserved for clients using...
Which configuration issue prevented the OSPF neighbor relationship from Forming?
Refer to the exhibit. After observing that an OSPF neighbor relationship failed to form, you executed a debug that returned the given output. Which configuration issue prevented the OSPF neighbor relationship from Forming?A . The hello and hold timers are mismatched.B . The area IDs are mismatchedC . The devices...
What should you run on the test computer before the capture?
You deploy Windows 10 and Microsoft Office 2016 to a test computer. You plan to capture an image of the test computer, and then to deploy the image to computers that will be sold to your customers. You need to ensure that when a customer first starts an Office application,...
Which two restrictions of the port security feature are true? (Choose two.)
Which two restrictions of the port security feature are true? (Choose two.)A . trunk portsB . SPAN portsC . tunnel portsD . EtherChannelE . private VLANsView AnswerAnswer: BD
What should you include in the recommendation?
You need to recommend a solution that meets the security requirements for the mailbox databases. What should you include in the recommendation?A . Resilient File System (ReFS)B . Transparent Data Encryption (TDE)C . BitLocker Drive Encryption (BitLocker)D . Encrypting Files System (EFS)View AnswerAnswer: C
Which of the following sshd configuration should be set to no in order to fully disable password based logins? (Choose two.)
Which of the following sshd configuration should be set to no in order to fully disable password based logins? (Choose two.)A . PAMAuthenticationB . ChallengegeResponseAuthenticationC . PermitPlaintextLoginD . UsePasswordsE . PasswordAuthenticationView AnswerAnswer: B,E
A timely review of system access audit records would be an example of which of the basic security functions?
A timely review of system access audit records would be an example of which of the basic security functions?A . avoidance.B . deterrence.C . prevention.D . detection.View AnswerAnswer: D Explanation: By reviewing system logs you can detect events that have occured. The following answers are incorrect: avoidance. This is incorrect, avoidance...