What are two virtualized components of a vMX? (Choose two)

What are two virtualized components of a vMX? (Choose two)A . VFPB . vNICC . vSwitchD . VCPView AnswerAnswer: A,D

October 1, 2018 No Comments READ MORE +

A customer requires wireless traffic from the branch to be routed through the firewall at corporate headquarters. There is a RADIUS server in each branch location. Which FlexConnect state should be used in this scenario?

A customer requires wireless traffic from the branch to be routed through the firewall at corporate headquarters. There is a RADIUS server in each branch location. Which FlexConnect state should be used in this scenario?A . local authentication and local switchingB . local authentication and central switchingC . central authentication...

October 1, 2018 No Comments READ MORE +

Which Azure Application Insights data model should you use?

You need to ensure that the solution can meet the scaling requirements for Policy Service. Which Azure Application Insights data model should you use?A . an Application Insights traceB . an Application Insights metricC . an Application Insights dependencyD . an Application Insights eventView AnswerAnswer: B

October 1, 2018 No Comments READ MORE +

What should you include in the recommendation?

HOTSPOT You have an Azure subscription. You plan to deploy five virtual machines that will have similar configurations and will run the same workload. You need to recommend a solution to ensure the availability of the virtual machines during Azure maintenance periods. At any given time, only one virtual machine...

October 1, 2018 No Comments READ MORE +

Which prefix is matched by the command ip prefix-list name permit 10.8.0.0/16 ge 24 le 24?

Which prefix is matched by the command ip prefix-list name permit 10.8.0.0/16 ge 24 le 24?A . 10.9.1.0/24B . 10.8.0.0/24C . 10.8.0.0/16D . 10.8.0.0/23View AnswerAnswer: B Explanation: With prefix lists, the ge 24 term means greater than or equal to a /24 and the le 24 means less than or...

October 1, 2018 No Comments READ MORE +

The primary purpose of Network Access Protection (NAP) is to prevent:

The primary purpose of Network Access Protection (NAP) is to prevent:A . Loss of data from client computers on a network.B . Non-compliant systems from connecting to a network.C . Users on a network from installing software.D . Unauthorized users from accessing a network.View AnswerAnswer: B Explanation: NAP enforces health...

October 1, 2018 No Comments READ MORE +

Complete the sentence. During the implementation of an architecture, if the original Architecture Definition and requirements are not suitable, a ____ may be submitted to initiate further architecture work.

Complete the sentence. During the implementation of an architecture, if the original Architecture Definition and requirements are not suitable, a ____ may be submitted to initiate further architecture work.A . Capability AssessmentB . Change RequestC . Requirements Impact AnalysisD . Statement of Architecture WorkView AnswerAnswer: B

October 1, 2018 No Comments READ MORE +

When a system is compromised, attackers often try to disable auditing, in Windows 7; modifications to the audit policy are recorded as entries of Event ID____________.

When a system is compromised, attackers often try to disable auditing, in Windows 7; modifications to the audit policy are recorded as entries of Event ID____________.A . 4902B . 3902C . 4904D . 3904View AnswerAnswer: A

October 1, 2018 No Comments READ MORE +

What should you do?

You have a server named Server1 that runs Windows Server 2012 R2. Each day, Server1 is backed up fully to an external disk. On Server1, the disk that contains the operating system fails. You replace the failed disk. You need to perform a bare-metal recovery of Server1 by using the...

October 1, 2018 No Comments READ MORE +

A network administrator wants to apply a critical PoE priority to any ArubaOS switch port that connects to an Aruba AP. The priority should be applied dynamically based on LLDP messages received from the AP Which step should the administrator take to meet this goal?

A network administrator wants to apply a critical PoE priority to any ArubaOS switch port that connects to an Aruba AP. The priority should be applied dynamically based on LLDP messages received from the AP Which step should the administrator take to meet this goal?A . Configure the PoE usage...

October 1, 2018 No Comments READ MORE +