What should you do on Server1?

Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Print and Document Services server role installed. You connect a new print device to the network. The marketing department and the sales department will use the print device. You need to provide users from...

August 27, 2018 No Comments READ MORE +

Which type of report should you use for each requirement?

DRAG DROP You have a Microsoft Intune subscription. You need to identify devices based on the following requirements: Which type of report should you use for each requirement? To answer, drag the appropriate reports to the correct requirements. Each report may be used once, more than once, are not at...

August 27, 2018 No Comments READ MORE +

What should you configure?

General Overview You are the Senior Database Administrator (DBA) for a software development company named Leafield Solutions. The company develops software applications custom designed to meet customer requirements. Requirements Leafield Solutions has been asked by a customer to develop a web-based Enterprise Resource Planning and Management application. The new application...

August 27, 2018 No Comments READ MORE +

When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?

When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?A . RADIUSB . Remote Access and RADIUSC . AD QueryD . AD Query and Browser-based AuthenticationView AnswerAnswer: D Explanation: Identity Awareness gets identities from these acquisition sources: AD Query Browser-Based Authentication Endpoint Identity Agent Terminal Servers Identity...

August 27, 2018 No Comments READ MORE +

Which of the following commands would provide the BEST information about the path taken across the network to this website?

A network technician has received comments from several users that cannot reach a particular website. Which of the following commands would provide the BEST information about the path taken across the network to this website?A . pingB . netstatC . telnetD . tracertView AnswerAnswer: D Explanation: The tracert command is...

August 27, 2018 No Comments READ MORE +

Which of the following inputs is suitable for debugging HTTPS inspection issues?

Which of the following inputs is suitable for debugging HTTPS inspection issues?A . vpn debug cptls onB . fw ctl debug Cm fw + conn drop cptlsC . fw diag debug tls enableD . fw debug tls on TDERROR_ALL_ALL=5View AnswerAnswer: B Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal? eventSubmit_doGoviewsolutiondetails=&solutionid=sk108202

August 27, 2018 No Comments READ MORE +

What does IBM's Best Practice documentation recommend?

A customer recently purchased a Power E870 that includes redundant Service Processors, and would like to implement dual HMCs. What does IBM's Best Practice documentation recommend?A . Each HMC should be connected to both Service Processors on a separate private network.B . The HMCs should share the same DHCP range.C...

August 27, 2018 No Comments READ MORE +

Who is responsible for implementing user clearances in computer-based information systems at the B3 level of the TCSEC rating ?

Who is responsible for implementing user clearances in computer-based information systems at the B3 level of the TCSEC rating ?A .  Security administratorsB .  OperatorsC .  Data ownersD .  Data custodiansView AnswerAnswer: A Explanation: Security administrator functions include user-oriented activities such as setting user clearances, setting initial password, setting other...

August 27, 2018 No Comments READ MORE +

What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. On Server1, you create a printer named Printer1. You share Printer1 and publish Printer1 in Active Directory. You need to provide a group named Group1 with the ability...

August 26, 2018 No Comments READ MORE +

Which statement is correct regarding using the TTL threshold to define the delivery boundaries of multicast traffic?

Which statement is correct regarding using the TTL threshold to define the delivery boundaries of multicast traffic?A . If a packet TTL is less than the specified TTL threshold, the packet is forwarded out of the interfaceB . If a packet TTL is greater or equal to the specified TTL...

August 26, 2018 No Comments READ MORE +