Which are two main use cases for Clientless SSL VPN? (Choose two.)

Which are two main use cases for Clientless SSL VPN? (Choose two.)A . In kiosks that are part of a shared environmentB . When the users do not have admin rights to install a new VPN clientC . When full tunneling is needed to support applications that use TCP, UDP,...

September 24, 2018 No Comments READ MORE +

What should you do first?

Your network contains an Active Directory domain. The domain contains 100 computers that run Windows 10. Your company is developing a line-of-business application. You plan to deploy the application by using Windows Store for Business. You need to ensure that a developer can publish the application to the Windows Store...

September 24, 2018 No Comments READ MORE +

Which three actions should you perform in sequence?

DRAG DROP Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1. All servers run Windows Server 2012 R2. All domain user accounts have the Division attribute automatically populated as part of the user provisioning process. The Support for Dynamic Access Control and...

September 24, 2018 No Comments READ MORE +

What should you use?

You have an Azure Cosmos DB account You need to view account-level performance metrics. What should you use?A . the REST APIB . the Azure portalC . Azure CLID . the .NET SDKView AnswerAnswer:

September 24, 2018 No Comments READ MORE +

Which two Azure PowerShell cmdlets should you run?

A company has multiple Azure subscriptions. It plans to deploy a large number of virtual machines (VMs) into Azure. You install the Azure PowerShell module, but you are unable connect to all of the company's Azure subscriptions. You need to automate the management of the Azure subscriptions. Which two Azure...

September 24, 2018 No Comments READ MORE +

Which security function can be utilized to protect the router?

After an incident caused by a DDOS attack on a router, an engineer must ensure that the router is accessible and protected from future attacks without making any changes to traffic passing through the router. Which security function can be utilized to protect the router?A . zone-based policy firewallB ....

September 24, 2018 No Comments READ MORE +

What should you install on Server1?

You have a server named Server1 that runs Windows Server 2016. You need to configure Server1 as a multitenant RAS Gateway. What should you install on Server1?A . the Network Controller server roleB . the Data Center Bridging featureC . the Remote Access server roleD . the Network Policy and...

September 24, 2018 No Comments READ MORE +

Which directory in /dev/disk/ can be used to determine the UUID of a connected hard disk?

Which directory in /dev/disk/ can be used to determine the UUID of a connected hard disk?View AnswerAnswer: /dev/disk/by-uuid, by-uuid, /dev/disk/by-uuid/

September 23, 2018 No Comments READ MORE +

Which option must be configured before IP Source Guard is used successfully in your network environment?

Which option must be configured before IP Source Guard is used successfully in your network environment?A . Dynamic ARP inspecrionB . DHCP snoopingC . port securityD . dot1txView AnswerAnswer: B

September 23, 2018 No Comments READ MORE +