What should you do?
You administer two instances of Microsoft SQL Server 2012. You deploy an application that uses a database on the named instance. The application is unable to connect to the database on the named instance. You need to ensure that the application can connect to the named instance. What should you...
Does this meet the goal?
You need To configure the Group Policy for salespeople. Solution: You create a Group Policy Object (GPO) with an AppLocker policy. You link the GPO to the Computers OU for each location. Does this meet the goal?A . YesB . NoView AnswerAnswer: B
What should you do?
You develop a Microsoft SQL Server 2012 database. You create a view that performs the following tasks: • Joins 8 tables that contain up to 500,000 records each. • Performs aggregations on 5 fields. The view is frequently used in several reports. You need to improve the performance of the...
Which additional routing protocol would you use for the overlay routing between the group members?
You are designing a Group Encrypted Transport virtual private network solution for an existing branch network. The existing network has the following characteristics: . 50 remote sites (with an additional 30 remote sites expected over the next 3 years) . Connectivity between all sites is via Multiprotocol Label Switching Layer...
Which option describes what a switch does after it items that a host has connected to a switch port?
Which option describes what a switch does after it items that a host has connected to a switch port?A . Flood the frame only on all of its trunk ports.B . Create a MAC to port mapping entry in MAC table.C . Flood the frame only on all of its...
Which function should you use?
You are developing a web form that includes the following code. When a user selects the check box, an input text box must be added to the page dynamically. You need to ensure that the text box is added. Which function should you use? A . Option AB . Option...
What ID is typically mapped to an AP's MAC address if a single BSS is implemented?
What ID is typically mapped to an AP's MAC address if a single BSS is implemented?A . VLAN IDB . BSSIDC . Device IDD . SSIDView AnswerAnswer: B
What is a unique characteristic of the most secure mode?
Cisco 802.1X phasing enables flexible deployments through the use of open, low-impact, and closed modes. What is a unique characteristic of the most secure mode?A . Granular ACLs applied prior to authenticationB . Per user dACLs applied after successful authenticationC . Only EAPoL traffic allowed prior to authenticationD . Adjustable...
Which function should you assign to each server?
DRAG DROP Background Corporate Information Fabrikam, Inc. is a retailer that sells electronics products on the Internet. The company has a headquarters site and one satellite sales office. You have been hired as the database administrator, and the company wants you to change the architecture of the Fabrikam ecommerce site...
Which of the following tools will verify this?
Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. Which of the following tools will verify this?A . Cable testerB . Toner probeC . OTDRD . Loopback plugView AnswerAnswer: A