Given the output shown from this Cisco Catalyst 2950, what is the reason that interface FastEthernet 0/10 is not the root port for VLAN 2?
Refer to the exhibit. Given the output shown from this Cisco Catalyst 2950, what is the reason that interface FastEthernet 0/10 is not the root port for VLAN 2?A . This switch has more than one interface connected to the root network segment in VLAN 2.B . This switch is...
Which TCSEC level is labeled Controlled Access Protection?
Which TCSEC level is labeled Controlled Access Protection?A . C1B . C2C . C3D . B1View AnswerAnswer: B Explanation: C2 is labeled Controlled Access Protection. The TCSEC defines four divisions: D, C, B and A where division A has the highest security. Each division represents a significant difference in the trust...
Which two tasks should you perform on Server2?
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and a server named Server2 that runs Windows Server 2008 R2 Service Pack 1 (SP1).Both servers are member servers. On Server2, you install all of the software required...
Which of the following will be MOST helpful in passing the audit?
A company is being audited by its operating system vendor. The company needs to report the number of operating systems in use, the versions of the operating systems, and the product keys. Which of the following will be MOST helpful in passing the audit?A . Asset management documentationB . Change...
Which replication type is unsupported with EMC Data Domain Extended Retention?
Which replication type is unsupported with EMC Data Domain Extended Retention?A . Managed file replication using NetworkerB . Collection Replication as destinationC . Directory Replication bi-directionalD . MTree Replication bi-directionalView AnswerAnswer: C
Select a true statement about Amazon EC2 Security Groups (EC2-Classic).
Select a true statement about Amazon EC2 Security Groups (EC2-Classic).A . After you launch an instance in EC2-Classic, you can't change its security groups.B . After you launch an instance in EC2-Classic, you can change its security groups only once.C . After you launch an instance in EC2-Classic, you can only...
Which option lists the information that is contained in a Cisco Discovery Protocol advertisement?
Which option lists the information that is contained in a Cisco Discovery Protocol advertisement?A . native VLAN IDs, port-duplex, hardware platformB . native VLAN IDs, port-duplex, memory errorsC . native VLAN IDs, memory errors, hardware platformD . port-duplex, hardware platform, memory errorsView AnswerAnswer: A Explanation: Type-Length-Value fields (TLVs) are blocks...
What should you configure?
Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Hyper-V server role installed.Server1 hosts four virtual machines named VM1, VM2, VM3, and VM4. Server1 is configured as shown in the following table. You need to ensure that VM1 can use more CPU time than...
What are three features of the IPV6 protocol? (choose three)
What are three features of the IPV6 protocol? (choose three)A . complicated headerB . plug-and-playC . no broadcastsD . checksumsE . optional IPsecF . autoconfigurationView AnswerAnswer: BCF
Which three prerequisites must be in place prior to enabling secure boot for a virtual machine? (Choose three.)
Which three prerequisites must be in place prior to enabling secure boot for a virtual machine? (Choose three.)A . VirtualMachine.Config.Settings privilegesB . an encrypted USB driveC . Virtual Hardware version 13 or laterD . Virtual Hardware version 12 or laterE . EFI firmwareView AnswerAnswer: A,C,E