Which Azure service should you use?
Your company is developing an e-commerce Azure App Service Web App to support hundreds of resturant locations around the world. You are designing the messaging solution architecture to support the e-commerce transactions and messages. The e-commerce application has the following features and requirements: You need to choose the Azure messaging...
Which of the following is important when thinking about being able to quickly launch resources in AWS to ensure business continuity in case of a disaster?
A major customer has asked you to set up his AWS infrastructure so that it will be easy to recover in the case of a disaster of some sort. Which of the following is important when thinking about being able to quickly launch resources in AWS to ensure business continuity in case of...
Which two statements about designing the Data Center Access layer are correct? (Choose two.)
Which two statements about designing the Data Center Access layer are correct? (Choose two.)A . Multiport NIC servers should each have their own IP address.B . Layer 3 connectivity should never be used in the access layer.C . Layer 2 connectivity is primarily implemented in the access layer.D . Multiport...
Which Azure PowerShell cmdlet should you run?
A company deploys Microsoft SQL Server on an Azure DS3 _V2_Standard virtual machine (VM). You need to modify the disk caching policy. Which Azure PowerShell cmdlet should you run?A . Update-AzureRmVmB . Set-AzureRMVMOSDiskC . Update-DiskD . Set-AzureRmVmView AnswerAnswer: B
Which server role should you install on Server1?
Your network contains an Active Directory forest. The forest functional level is Windows Server 2012 R2. The forest contains a single domain. The domain contains a member server named Server1. Server1 runs windows Server 2012 R2. You purchase a network scanner named Scanner1 that supports Web Services on Devices (WSD)....
Which two best practices should you follow?
You need to add indexes to a table. Which two best practices should you follow? Each correct answer presents part of the solution.A . Determine how the table should be organized by specifying a clustered index.B . Specify a primary index to determine the unique key on the table.C ....
When implementing source-based remote-triggered black hole filtering, which two configurations are required on the edge routers that are not the signaling router? (Choose two.)
When implementing source-based remote-triggered black hole filtering, which two configurations are required on the edge routers that are not the signaling router? (Choose two.)A . A static route to a prefix that is not used in the network with a next hop set to the Null0 interfaceB . A static...
Which VPN technology uses the Group Domain of Interpretation as the keying protocol and IPsec for encryption that is often deployed over a private MPLS core network?
Which VPN technology uses the Group Domain of Interpretation as the keying protocol and IPsec for encryption that is often deployed over a private MPLS core network?A . DMVPNB . GET VPNC . SSL VPND . L2TPv3View AnswerAnswer: B
Which report is the most useful?
An anti-money laundering specialist at a large institution is responsible for information senior management about the status of the anti-money laundering program across the organization. Which report is the most useful?A . The total credit exposure for non-cooperative countries and territoriesB . Results of related audits and examinationsC . Details...
Why must you use aggressive mode when a local FortiGate IPsec gateway hosts multiple dialup tunnels?
Why must you use aggressive mode when a local FortiGate IPsec gateway hosts multiple dialup tunnels?A . The FortiGate is able to handle NATed connections only with aggressive mode.B . FortiClient supports aggressive mode.C . The remote peers are able to provide their peer IDs in the first message with...