Which protocol is used for port-level access control and authentication?

Which protocol is used for port-level access control and authentication?A . MD5B . IPsecC . 802.1XD . AESView AnswerAnswer: C

September 21, 2018 No Comments READ MORE +

Which statement about LDP Session Protection and LDP-IGP sync is true?

Which statement about LDP Session Protection and LDP-IGP sync is true?A . Both LDP features cannot be used at the same time in a MPLS LDP enabled networkB . LDP Session Protection re-exchanges label information when a down-up event occurs; LDP-IGP sync keeps the adjacency and label information in a...

September 21, 2018 No Comments READ MORE +

What should you do before you migrate the user accounts?

You are planning the decommissioning of research.contoso.com. You need to ensure that an administrator named Admin5 in the research department can manage the user accounts that are migrated to contoso.com. The solution must minimize the number of permissions assigned to Admin5. What should you do before you migrate the user...

September 21, 2018 No Comments READ MORE +

For SMC2.0 system, if the user forgets the password, the system administrator can reset the password, the important SMC will automatically generate a new password. ( )

For SMC2.0 system, if the user forgets the password, the system administrator can reset the password, the important SMC will automatically generate a new password. ( )A . TRUEB . FALSEView AnswerAnswer: A

September 21, 2018 No Comments READ MORE +

In which scenario is Use Accelerator unavailable in a backup policy?

In which scenario is Use Accelerator unavailable in a backup policy?A . for VMware virtual machines with a Linux guest OSB . for virtual machines hosted on a Hyper-V Host using WMIC . for a NetApp NDMP filerD . for an Exchange database availability group (DAG)View AnswerAnswer: D

September 21, 2018 No Comments READ MORE +

What is the default maximum number of Access Keys per user?

What is the default maximum number of Access Keys per user?A .  10B .  15C .  2D .  20View AnswerAnswer: C Explanation: The default maximum number of Access Keys per user is 2. Reference: http://docs.aws.amazon.com/IAM/latest/UserGuide/LimitationsOnEntities.html

September 21, 2018 No Comments READ MORE +

Which code segment should you use?

You are developing application web form by using HTML5 and JavaScript. You need to prevent users from submitting form data more than once. Which code segment should you use? A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: A Explanation: * this, in disable(this), refers...

September 21, 2018 No Comments READ MORE +

Which stored procedure option should you use?

You are a database developer at an independent software vendor. You create stored procedures that contain proprietary code. You need to protect the code from being viewed by your customers. Which stored procedure option should you use?A . ENCRYPTBYKEYB . ENCRYPTIONC . ENCRYPTBYPASSPHRASED . ENCRYPTBYCERTView AnswerAnswer: B Explanation: Reference: http://technet.microsoft.com/en-us/library/bb510663.aspx...

September 21, 2018 No Comments READ MORE +

Which statement about a bridge domain is true?

Which statement about a bridge domain is true?A . A bridge domain must be liked to one internal network and one external networkB . A bridge domain must be linked to a physical domainC . A bridge domain typically has at least one subnet that Is associated with itD ....

September 21, 2018 No Comments READ MORE +

Which three new features of VTPv3 are true? (Choose three.)

Which three new features of VTPv3 are true? (Choose three.)A . It offers better administrative control over which device is allowed to update other devices view of VLAN topologyB . Unintended and disruptive changes are reduced and availability has increased.C . The functionality of the VLAN environment has been expandeD...

September 21, 2018 No Comments READ MORE +