Which solution meets these requirements?

A service provider requires that the PE-CE link must be optimized by only compressing the TCP header regards to Business traffic policy neither voice traffic nor other traffic policies must be compressed. Which solution meets these requirements?A . header compression using IPHC profilesB . enhanced RTP header compressionC . class-based...

September 15, 2018 No Comments READ MORE +

Which statement is FALSE about dbspace configurable page sizes?

Which statement is FALSE about dbspace configurable page sizes?A . Dbspace page size can only be set for non-critical dbspaces.B . Possible page sizes are multiples of the default page size up to 16 kb.C . Configure page sizes as close to the backup / restore and network buffer size...

September 15, 2018 No Comments READ MORE +

Which recovery model should the database use?

You administer a Microsoft SQL Server 2012 instance that contains a financial database hosted on a storage area network (SAN). The financial database has the following characteristics: A data file of 2 terabytes is located on a dedicated LUN (drive D). A transaction log of 10 GB is located on...

September 15, 2018 No Comments READ MORE +

What is the CONSTRUCT statement used for?

What is the CONSTRUCT statement used for?A . to include user input in SQL queriesB . to arrange an array of program variablesC . to pre-optimize a statement before beginning a queryD . to build an arbitrarily complex data structure in memoryView AnswerAnswer: A

September 15, 2018 No Comments READ MORE +

Which two tools should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains three servers named Server1, Server2, and Server3 that run Windows Server 2012 R2. All three servers have the Hyper-V server role installed and the Failover Clustering feature installed. Server1 and Server2 are nodes in a failover cluster named...

September 15, 2018 No Comments READ MORE +

In TCP/IPv4, what are potential security threats? (Multiple Choice)

In TCP/IPv4, what are potential security threats? (Multiple Choice)A . There is no data source verification mechanism.B . There is no data packet acknowledgement mechanism.C . There is no data integrity verification mechanism.D . There is no confidentiality guarantee mechanism.View AnswerAnswer: ACD

September 15, 2018 No Comments READ MORE +

To create and make changes to all aspects of the system, which mode in Manager do you select?

To create and make changes to all aspects of the system, which mode in Manager do you select?A . Installation ModeB . Simplified ViewC . Basic EditionD . Configuration ModeView AnswerAnswer: D

September 15, 2018 No Comments READ MORE +

What should you do first?

You have a server named dc2.contoso.com that runs Windows Server 2012 R2 and has the DNS Server role installed. You open DNS Manager as shown in the exhibit. (Click the Exhibit button.) You need to view the DNS server cache from DNS Manager. What should you do first?A . From...

September 15, 2018 No Comments READ MORE +

What should you run?

Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a server named Server1 that has the Network Policy Server server role and the Remote Access server role installed. The domain contains a server named Server2 that is configured as a...

September 15, 2018 No Comments READ MORE +

Which step should the engineer take to perform this task?

An engineer needs to limit the power consumption of a chassis without powering down any server nodes. Which step should the engineer take to perform this task?A . Use the CMC to configure the System Input Power Cap for the chassisB . Use the iDRAC to configure the Power Cap...

September 15, 2018 No Comments READ MORE +