According to the IEEE 802.1Q standard, which position does VLAN identification field in the Ethernet frame ?

According to the IEEE 802.1Q standard, which position does VLAN identification field in the Ethernet frame ?A . before the source MAC address and destination MAC addressB . in the middle of source MAC address and destination MAC addressC . after the source MAC address and destination MAC addressD ....

September 27, 2018 No Comments READ MORE +

What commands must be configured on the 2950 switch and the router to allow communication between host 1 and host 2?

Refer to the exhibit. What commands must be configured on the 2950 switch and the router to allow communication between host 1 and host 2? (Choose two.)A . Router(config)# interface fastethernet 0/0 Router(config-if)# ip address 192.168.1.1 255.255.255.0 Router(config-if)# no shut downB . Router(config)# interface fastethernet 0/0 Router(config-if)# no shut down...

September 27, 2018 No Comments READ MORE +

The PMO is responsible for: (Choose two.)

The PMO is responsible for: (Choose two.)A . managing the project plan, scope, risk, and budget.B . contributing expertise, deliverables, and estimates of costs.C . setting standards and practices for the organization and providing governance.D . outlining consequences of non-performance and coordinating between disparate projects.E . approving funding, developing the...

September 27, 2018 No Comments READ MORE +

Which statement is true regarding redundancy?

Which statement is true regarding redundancy?A . System Administrator know when their cluster has failed over and can also see why it failed over by using the cphaprob f it command.B . ClusterXL offers three different Load Sharing solutions: Unicast, Broadcast, and Multicast.C . Machines in a Cluster XL High...

September 27, 2018 No Comments READ MORE +

What should you do on Server1?

You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Print and Document Services server role installed. Server1 is connected to two identical print devices. The solution must ensure that if one print device fails, the print jobs will print automatically on the other print...

September 27, 2018 No Comments READ MORE +

Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two)

Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two)A . It is locally significant.B . It is globally significant.C . It is needed to identify a unique instance of an OSPF database.D . It is an optional parameter required only...

September 27, 2018 No Comments READ MORE +

What should you do?

You administer two Microsoft SQL Server 2016 servers named ProdSrv1 and ProdSrv2. ProdSrv1 is configured as a Distributor. Both servers are configured to use the Windows NT Service virtual accounts for all SQL Services. You are configuring snapshot replication from ProdSrv1 to ProdSrv2 by using ProdSrv2 as a pull subscriber....

September 27, 2018 No Comments READ MORE +

How many calls are supported on a Cisco Meeting Server 2000?

How many calls are supported on a Cisco Meeting Server 2000?A . 48HD(1080p)/192SDB . 96HD(1080p)/384SDC . 250 HD(1080P)/1000 SDD . 500 HD(1080p)/2000 SDView AnswerAnswer: C

September 27, 2018 No Comments READ MORE +

You are building a system to distribute confidential documents to employees. Using CloudFront, what method could be used to serve content that is stored in S3, but not publically accessible from S3 directly?

You are building a system to distribute confidential documents to employees. Using CloudFront, what method could be used to serve content that is stored in S3, but not publically accessible from S3 directly?A .  Add the CloudFront account security group “amazon-cf/amazon-cf-sg” to the appropriate S3 bucket policy.B .  Create a S3 bucket policy...

September 27, 2018 No Comments READ MORE +

The dsmerror.log states that a file is in use by another process and cannot be backed up. Which backup policy attribute should be examined to determine the criteria that are used for a file backup?

The dsmerror.log states that a file is in use by another process and cannot be backed up. Which backup policy attribute should be examined to determine the criteria that are used for a file backup?A . modeB . serializationC . absoluteD . frequencyView AnswerAnswer: A Explanation: MODE, SERialization, FREQuency are...

September 27, 2018 No Comments READ MORE +