Which of the following is a necessary step to record the actual durations?

A project manager needs to track the actual and estimated start and finish dates of all WBS work packages. Which of the following is a necessary step to record the actual durations?A . Establish each WBS work package resource.B . Establish and set the baseline.C . Establish and set the...

August 24, 2018 No Comments READ MORE +

Which two statements about AAA implementation in a Cisco router are true? (Choose two.)

Which two statements about AAA implementation in a Cisco router are true? (Choose two.)A . RADIUS is more flexible than TACACS+ in router managementB . RADIUS and TACACS+ allow accounting of commands.C . RADIUS and TACACS+ encrypt the entire body of the packetD . RADIUS and TACACS+ are client/server AAA...

August 24, 2018 No Comments READ MORE +

Which network ID should you use?

DRAG DROP You are configuring a test network. The test network contains a subnet named LAN1. LAN1 uses the network ID of 10.10.1.0/27. You plan to add a new subnet named LAN2 to the test network. LAN1 and LAN2 will be connected by a router. You need to identify a...

August 24, 2018 No Comments READ MORE +

Fill in the blanks: A Check Point software license consists of a _______ and _______ .

Fill in the blanks: A Check Point software license consists of a _______ and _______ .A . Software container; software packageB . Software blade; software containerC . Software package; signatureD . Signature; software bladeView AnswerAnswer: B Explanation: Check Point's licensing is designed to be scalable and modular. To this end,...

August 24, 2018 No Comments READ MORE +

Which definition of permissions in Linux is true?

Which definition of permissions in Linux is true?A . rules that allow network traffic to go in and outB . table maintenance programC . written affidavit that you have to sign before using the systemD . attributes of ownership and control of an objectView AnswerAnswer: D

August 24, 2018 No Comments READ MORE +

When using the Cisco EVC software infrastructure, a double-tagged frame with a customer VLAN of 10 and a service provider VLAN of 150 will be best matched by which encapsulation configuration?

When using the Cisco EVC software infrastructure, a double-tagged frame with a customer VLAN of 10 and a service provider VLAN of 150 will be best matched by which encapsulation configuration?A . encapsulation dot1q 10 second-dot1q anyB . encapsulation dot1q 10 second-dot1q 150C . encapsulation dot1q 10 second-dot1q 50-200D ....

August 24, 2018 No Comments READ MORE +

Which action can fox this issue?

Refer to the exhibit the 2.6.6.6/32 prefix is flapping when PE1 is flapping. Which action can fox this issue?A . On PE2, allow only redistribution from BGP into IS-IS on PE3, allow only redistribution from IS-IS into BGPB . On PE2 and PE3 reconfigure redistribute BGP into IS-IS using the...

August 24, 2018 No Comments READ MORE +

Which of the following is NOT TRUE about the DataStage job score?

Which of the following is NOT TRUE about the DataStage job score?A . It includes the operators automatically inserted at runtimeB . It helps to determine the number of actual operating system processesC . It reports the amount of memory used by the inter-operator transport buffersD . It outlines the...

August 24, 2018 No Comments READ MORE +

Which of the following is best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in a system?

Which of the following is best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in a system?A .  Fail proofB .  Fail softC .  Fail safeD .  Fail OverView AnswerAnswer: C Explanation: NOTE: This...

August 24, 2018 No Comments READ MORE +

Which two things should the engineer consider during this process?

An engineer is syncing Cisco Unity Connection with LDAP. Which two things should the engineer consider during this process? (Choose two.)A . PINs and passwords are replicated from the LDAP database to Cisco Unity Connection database.B . LDAP authentication must be configured and enabled.C . There is no limit to...

August 24, 2018 No Comments READ MORE +