Which statement is true about this command?

The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router. No routing protocols or other static routes are configured on the router. Which statement is true about this command?A . The interface with IP address 192.168.10.2 is on this router.B . The command sets a gateway of last...

July 29, 2018 No Comments READ MORE +

What should you run on Server1?

You have a server named Server1. You enable BitLocker Drive Encryption (BitLocker) on Server1. You need to change the password for the Trusted Platform Module (TPM) chip. What should you run on Server1?A . Initialize-TpmB . Import-TpmOwnerAuthC . repair-bde.exeD . bdehdcfg-exeView AnswerAnswer: B

July 29, 2018 No Comments READ MORE +

Which command allows the telephony service of a Cisco Unified Communications Manager Express router to be associated to loopback address 192.168.143.44?

Which command allows the telephony service of a Cisco Unified Communications Manager Express router to be associated to loopback address 192.168.143.44?A . !telephony-servicemax-ephones 4max-dn 8ip source-address 192.168.143.44!B . !telephony-servicemax-ephones 4max-dn 8ip bind src-addr 192.168.143.44!C . !telephony-servicemax-ephones 4max-dn 8source-address ipv4:192.168.143.44!D . !telephony-servicemax-ephones 4max-dn 8ip address 192.168.143.44!View AnswerAnswer: A

July 29, 2018 No Comments READ MORE +

What should you do?

You have a Hyper-V host named Server1 that runs Windows Server 2012 R2. Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2. VM1 has several snapshots. You need to modify the snapshot file location of VM1. What should you do?A . Delete the existing snapshots, and...

July 29, 2018 No Comments READ MORE +

Given the CIA triad elements, which ensures first that the data is encrypted and secure, second that the data is trustworthy, and third that the data is accessible by those who need it?

Given the CIA triad elements, which ensures first that the data is encrypted and secure, second that the data is trustworthy, and third that the data is accessible by those who need it?A . CIAB . ICAC . ACID . CAIView AnswerAnswer: A

July 29, 2018 No Comments READ MORE +

What is the name of the function that allows you register a set of functions that implement user-defined session handling?

What is the name of the function that allows you register a set of functions that implement user-defined session handling?A . session_set_handler()B . session_set_storage_handler()C . session_register_handler()D . session_set_save_handler()View AnswerAnswer: D

July 29, 2018 No Comments READ MORE +

What should you do?

DRAG DROP Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2.Server1 and Server2 run a Server with a GUI installation of Windows Server 2012 R2. You remove the Graphical Management Tools and Infrastructure feature on Server2. You need to restart Server2....

July 29, 2018 No Comments READ MORE +

What should you recommend?

You are designing a Windows Azure application that will use a worker role. The worker role will create temporary files. You need to recommend an approach for creating the temporary files that minimizes storage transactions. What should you recommend?A . Create the files on a Windows Azure Drive.B . Create...

July 29, 2018 No Comments READ MORE +

Which two QoS mark methods can a service use to mark user traffic and be visible only internally to the router? (Choose two)

Which two QoS mark methods can a service use to mark user traffic and be visible only internally to the router? (Choose two)A . 802.1pB . DS-TEC . discard-classD . ToSE . QoS-groupF . MPLS EXP bitsG . DSCPView AnswerAnswer: C, E

July 29, 2018 No Comments READ MORE +

What is a consideration for this configuration?

A company is in the process of configuring their Top of Rack (ToR) switches as a single rack that replicates to a secondary data center with vSphere Replication. What is a consideration for this configuration?A . IPv6 and IPv4 multi-cast should be layer-3 routed between data centersB . IPv6 and...

July 29, 2018 No Comments READ MORE +