Which are two main use cases for Clientless SSL VPN? (Choose two.)
Which are two main use cases for Clientless SSL VPN? (Choose two.)A . In kiosks that are part of a shared environmentB . When the users do not have admin rights to install a new VPN clientC . When full tunneling is needed to support applications that use TCP, UDP,...
What should you do first?
Your network contains an Active Directory domain. The domain contains 100 computers that run Windows 10. Your company is developing a line-of-business application. You plan to deploy the application by using Windows Store for Business. You need to ensure that a developer can publish the application to the Windows Store...
How many IP extensions and how many terminals do I need to register for this situation?
Avaya Communicator for Microsoft Lync is registered as a H.323/SIP softphone to Communication Manager/Session Manager and can share extensions with H.323/SIP phones. How many IP extensions and how many terminals do I need to register for this situation?A . Register 1 extension and require 1 terminal licenseB . Register 1...
Which three actions should you perform in sequence?
DRAG DROP Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1. All servers run Windows Server 2012 R2. All domain user accounts have the Division attribute automatically populated as part of the user provisioning process. The Support for Dynamic Access Control and...
What should you use?
You have an Azure Cosmos DB account You need to view account-level performance metrics. What should you use?A . the REST APIB . the Azure portalC . Azure CLID . the .NET SDKView AnswerAnswer:
Which two Azure PowerShell cmdlets should you run?
A company has multiple Azure subscriptions. It plans to deploy a large number of virtual machines (VMs) into Azure. You install the Azure PowerShell module, but you are unable connect to all of the company's Azure subscriptions. You need to automate the management of the Azure subscriptions. Which two Azure...
Which security function can be utilized to protect the router?
After an incident caused by a DDOS attack on a router, an engineer must ensure that the router is accessible and protected from future attacks without making any changes to traffic passing through the router. Which security function can be utilized to protect the router?A . zone-based policy firewallB ....
What should you install on Server1?
You have a server named Server1 that runs Windows Server 2016. You need to configure Server1 as a multitenant RAS Gateway. What should you install on Server1?A . the Network Controller server roleB . the Data Center Bridging featureC . the Remote Access server roleD . the Network Policy and...
Which directory in /dev/disk/ can be used to determine the UUID of a connected hard disk?
Which directory in /dev/disk/ can be used to determine the UUID of a connected hard disk?View AnswerAnswer: /dev/disk/by-uuid, by-uuid, /dev/disk/by-uuid/
Which option must be configured before IP Source Guard is used successfully in your network environment?
Which option must be configured before IP Source Guard is used successfully in your network environment?A . Dynamic ARP inspecrionB . DHCP snoopingC . port securityD . dot1txView AnswerAnswer: B