How can a task use the value provided for TargetEnvironment?

A declarative Jenkins pipeline contains the following excerpt: parameters { string (name: ‘TargetEnvironment’, defaultValue: ‘staging’, description: ‘Target environment’) } How can a task use the value provided for TargetEnvironment?A . {{TargetEnvironment}}B . $TargetEnvironmentC . %TargetEnvironment%D . ${params.TargetEnvironment}E . $ENV{TargetEnvironment}View AnswerAnswer: B

September 3, 2018 No Comments READ MORE +

When troubleshooting VXLAN, which interface is the source of all the encapsulated packets?

When troubleshooting VXLAN, which interface is the source of all the encapsulated packets?A . VTEP loopbackB . SVlC . VLAND . VpcView AnswerAnswer: A

September 3, 2018 No Comments READ MORE +

Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?

Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?A . ICMP Echo scanningB . SYN/FIN scanning using IP fragmentsC . ACK flag probe scanningD . IPID scanningView AnswerAnswer: B

September 3, 2018 No Comments READ MORE +

Which definition of a process in Windows is true?

Which definition of a process in Windows is true?A . running programB . unit of execution that must be manually scheduled by the applicationC . database that stores low-level settings for the OS and for certain applicationsD . basic unit to which the operating system allocates processor timeView AnswerAnswer: A

September 3, 2018 No Comments READ MORE +

Which of the following is the BEST security method to implement on the access points?

A wireless network technician for a local retail store is installing encrypted access points within the store for real-time inventory verification, as well as remote price checking capabilities, while employees are away from the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest...

September 3, 2018 No Comments READ MORE +

What should you do?

HOTSPOT You need to protect the personal data of employees. What should you do? To answer, select the appropriate options in the answer area. View AnswerAnswer: Explanation: Scenario: Active Directory The company plans to use Active Directory to store personal information for employees. Users in the branch offices must not...

September 3, 2018 No Comments READ MORE +

Which are two possible causes for this?

An administrator cannot enable multi-processor Fault Tolerance (SMP-FT) for a virtual machine. Which are two possible causes for this? (Choose two.)A . The virtual machine is running on a vSAN datastore.B . The Fault Tolerance network is using a 10Gbit uplink.C . The virtual machine has 6 vCPUs assigned.D ....

September 3, 2018 No Comments READ MORE +

When is int_flag set to TRUE?

When is int_flag set to TRUE?A . when the DEFER INTERRUPT statement is executedB . only at program initialization by an INFORMIX-4GL libraryC . in a user-defined error handler executed when the user presses the interrupt key when prompted for inputD . when the user presses the interrupt key when...

September 3, 2018 No Comments READ MORE +

Which of the following best describes the TOGAF Architecture Development Method?

Which of the following best describes the TOGAF Architecture Development Method?A . A process for managing architecture requirementsB . A classification mechanism for architectures and solutionsC . A process for managing and controlling change at an enterprise-wide levelD . A view of the Architecture RepositoryE . A process for developing...

September 3, 2018 No Comments READ MORE +