What should you configure?
Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-V server role installed. Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table. You install a network monitoring application on VM2. You need to...
What should you do?
You administer a Microsoft SQL Server 2016 failover cluster that contains two nodes named Node A and Node B. A single instance of SQL Server is installed on the cluster. An additional node named Node C has been added to the existing cluster. You need to ensure that the SQL...
What could be a possible cause of this problem?
The vSAN health check is reporting errors about the stats.db object. What could be a possible cause of this problem?A . vSAN performance service is not enabled on one of the ESX nodesB . vSAN health service is disabledC . There are inaccessible/unhealthy vSANobjectsD . vSAN performance service is not...
Which ways can FortiGate deliver one-time passwords (OTPs) to two-factor authentication users in your network?
Which ways can FortiGate deliver one-time passwords (OTPs) to two-factor authentication users in your network? (Choose three.) Response:A . Hardware FortiTokenB . Web portalC . SMSD . USB FortiTokenE . FortiToken MobileView AnswerAnswer: ACE
The Reference Validation Mechanism that ensures the authorized access relationships between subjects and objects is implementing which of the following concept:
The Reference Validation Mechanism that ensures the authorized access relationships between subjects and objects is implementing which of the following concept:A . The reference monitor.B . Discretionary Access Control.C . The Security Kernel.D . Mandatory Access Control.View AnswerAnswer: A Explanation: The reference monitor concept is an abstract machine that ensures...
On PE7, how many multiprotocol IBGP routes are learned from PE8 and what is the next-hop IP address? (Choose two.)
On PE7, how many multiprotocol IBGP routes are learned from PE8 and what is the next-hop IP address? (Choose two.) A . 1B . 2C . 3D . 10.8.1.1E . 172.16.8.1F . 192.168.108.81View AnswerAnswer: B,E
Which backup should you perform every two hours?
You administer a Microsoft SQL Server 2014 instance that contains a financial database hosted on a storage area network (SAN). The financial database has the following characteristics: The database is continually modified by users during business hours from Monday through Friday between 09:00 hours and 17:00 hours. Five percent of...
What is the cause of the error?
You implement an Azure Cosmos DB database that uses the SQL API. You have an application that uses the Rest API to access the database. The application receives an Http status code of 413 Entity Too Large What is the cause of the error?A . The application issued a query...
Which route pattern will be matched if a user dials an international number 011442288223001 and terminates the interdigit timeout?
!# To reach an external number, a user first dials a 9. Which route pattern will be matched if a user dials an international number 011442288223001 and terminates the interdigit timeout?A . 9.1[2-9]XX[2-9]XXXXXC . 9.18[0,6-8][0,6-8]XXXXXXE . 9.1900XXXXXXG . 9011.!.H . 9011.!#.View AnswerAnswer: E
CDP?
Enabling what security mechanism can prevent an attacker from gaining network topology information from CDP?A . MACsecB . Flex VPNC . Control Plane ProtectionD . Dynamic Arp InspectionView AnswerAnswer: A