Which description of the Cisco Meraki data center design is true?

Which description of the Cisco Meraki data center design is true?A . hybrid cloud and on-premises deployment comprised of custom designed servers for real-time replication of data.B . Regional availability providing data-on demand that replicates customer data and applications across a global infrastructureC . close partnership with hundreds of third...

August 22, 2018 No Comments READ MORE +

What should you create?

You have a server named Server1 that runs Windows Server 2012 R2. You connect three new hard disks to Server1. You need to create a storage space that contains the three disks. The solution must meet the following requirements: • Provide fault tolerance if a single disk fails. • Maximize...

August 22, 2018 No Comments READ MORE +

Which of the following is the MOST likely risk in this situation?

A security consultant discovers that an organization is using the PCL protocol to print documents, utilizing the default driver and print settings. Which of the following is the MOST likely risk in this situation?A . An attacker can access and change the printer configuration.B . SNMP data leaving the printer...

August 22, 2018 No Comments READ MORE +

Which two statements describe the operation of the CSMA/CD access method? (Choose two.)

Which two statements describe the operation of the CSMA/CD access method? (Choose two.)A . In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.B . In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.C . The use of hubs to...

August 22, 2018 No Comments READ MORE +

What should you configure?

You have a server named Server1 that runs Windows Server 2012 R2. On Server1, you configure a custom Data Collector Set (DCS) named DCS1. DCS1 is configured to store performance log data in C:Logs. You need to ensure that the contents of C:Logs are deleted automatically when the folder reaches...

August 22, 2018 No Comments READ MORE +

Which two design criteria require VLANs in a proposed solution? (Choose two.)

Which two design criteria require VLANs in a proposed solution? (Choose two.)A . video streaming on the LANB . security between departmentsC . the segmenting of collision domainsD . the segmenting of broadcast domainsE . the use of multivendor equipmentF . a limited corporate budgetView AnswerAnswer: B,D

August 22, 2018 No Comments READ MORE +

What command should you run first?

HOTSPOT Your network contains an Active Directory domain named contoso.com. You install the IP Address Management (IPAM) Server feature on a server named Server1 and select Manual as the provisioning method. The IPAM database is located on a server named SQL1. You need to configure IPAM to use Group Policy...

August 22, 2018 No Comments READ MORE +

Which two of these are required in order to complete the password recovery of a Cisco TelePresence System endpoint? (Choose two.)

Which two of these are required in order to complete the password recovery of a Cisco TelePresence System endpoint? (Choose two.)A . must have FTP enabled on the endpointB . must have SSH enabled on the endpointC . must have the security question answer for the endpointD . must be...

August 22, 2018 No Comments READ MORE +

In this scenario, which statement describes how to accomplish this task?

You have expanded your ONTAP cluster from two nodes to four nodes and want to allow Linux multipathing software to see the paths to all nodes in the cluster. In this scenario, which statement describes how to accomplish this task?A . Add the WWPN to the host igroup then rescan...

August 22, 2018 No Comments READ MORE +

What are two differences between IPv6 ISATAP tunneling and IPv6 6to4 tunneling? (Choose two)

What are two differences between IPv6 ISATAP tunneling and IPv6 6to4 tunneling? (Choose two)A . Only ISATAP tunneling can transfer IPv6 multicast packetsB . Only 6to4 tunneling transfers unicast IPv6 packets within a siteC . Only ISATAP tunneling transfers unicast IPv6 packets between sitesD . Only ISATAP tunneling transfers unicast...

August 22, 2018 No Comments READ MORE +