Which two values should you assign to the device ID?

You manage a server that runs Windows Server 2012 R2. The server has the Windows Deployment Services server role installed. You start a virtual machine named VM1 as shown in the exhibit. (Click the Exhibit button.) You need to configure a pre-staged device for VM1 in the Windows Deployment Services...

October 6, 2018 No Comments READ MORE +

Which two statements about Cisco URL Filtering on Cisco IOS Software are true? (Choose two)

Which two statements about Cisco URL Filtering on Cisco IOS Software are true? (Choose two)A . It supports Websense and N2H2 filtering at the same time,B . It supports local URL lists and third-party ULR filtering servers.C . By default, it uses ports 80 and 22.D . It supports HTTP...

October 6, 2018 No Comments READ MORE +

The _____________ parameter in the smb.conf file will set hidden files in Linux to also be hidden in windows. (Please specify ONLY the parameter with no value assignment.)

The _____________ parameter in the smb.conf file will set hidden files in Linux to also be hidden in windows. (Please specify ONLY the parameter with no value assignment.)View AnswerAnswer: hide dot files

October 6, 2018 No Comments READ MORE +

time server?

What command can you enter on a Cisco router so that it can both poll a time server and be polled by a time server?A . ntp serverB . ntp broadcast destinationC . ntp peerD . ntp broadcast clientView AnswerAnswer: A

October 6, 2018 No Comments READ MORE +

What are two terminating actions of a Layer 2 firewall filter? (Choose two.)

What are two terminating actions of a Layer 2 firewall filter? (Choose two.)A . rejectB . acceptC . logD . discardView AnswerAnswer: BD

October 6, 2018 No Comments READ MORE +

A network engineer is troubleshooting why EAP authentication with a client is failing. Which two commands should be used to resolve the issue? (Choose two)

A network engineer is troubleshooting why EAP authentication with a client is failing. Which two commands should be used to resolve the issue? (Choose two)A . debug dot1x notifications enableB . debug dot1x events enableC . debug arpD . debug aaa detail enableE . debug aaa events detail enableView AnswerAnswer:...

October 6, 2018 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

October 6, 2018 No Comments READ MORE +

SMC2.0 user types have ( ). (Multiple choice)

SMC2.0 user types have ( ). (Multiple choice)A . AdministratorB . Conference administratorC . OperatorD . AdminView AnswerAnswer: ABC

October 6, 2018 No Comments READ MORE +

Which of the following is the MOST secure method of storing critical and sensitive system information (e.g., administrative passwords, trusted signing keys)?

Which of the following is the MOST secure method of storing critical and sensitive system information (e.g., administrative passwords, trusted signing keys)?A . Store the information encrypted and offline in a storage safe.B . Encrypt the information using a zip file with a password.C . Utilize a drive with full...

October 6, 2018 No Comments READ MORE +

Which two authentication methods should the architect use for the Contractors group?

Scenario: A Citrix Architect needs to design a new XenApp and XenDesktop environment. The architect has identified the User Layer requirements, as shown in the Exhibit. Click the Exhibit button to view the requirements. Additionally, management at the organization has identified the following general Access Layer requirements: A multi-factor authentication...

October 6, 2018 No Comments READ MORE +