What should you run?

You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. Server1 is configured to obtain an IPv4 address by using DHCP. You need to configure the IPv4 settings of the network connection on Server1 as follows: • IP address: 10.1.1.1 • Subnet mask:...

August 3, 2018 No Comments READ MORE +

Which two configurations should you perform from DNS Manager?

Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the DNS Server role installed. The network contains client computers that run either Linux, Windows 7, or Windows 8. You have a standard primary zone...

August 3, 2018 No Comments READ MORE +

Which option is a misuse variety per VERIS enumerations?

Which option is a misuse variety per VERIS enumerations?A . snoopingB . hackingC . theftD . assaultView AnswerAnswer: B

August 3, 2018 No Comments READ MORE +

For each authentication method, which option should you use?

DRAG DROP You need to ensure that users can share sales data. For each authentication method, which option should you use? To answer, drag the appropriate option to the correct authentication method. Each option may be used once, more than once, or not at all. You may need to drag the split bar between panes or...

August 3, 2018 No Comments READ MORE +

Which two actions should you perform?

Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All servers run Windows Server 2012 R2. The domain contains two domain controllers named DC1 and DC2. Both domain controllers are virtual machines on a Hyper-V host. You plan to create a cloned domain controller...

August 3, 2018 No Comments READ MORE +

What should you do on Server1?

Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Network Policy Server role installed. You configure Server1 as part of a Network Access Protection (NAP) solution that uses the 802.lx enforcement method, You add a new switch to the network and you configure the...

August 3, 2018 No Comments READ MORE +

The behavior of which packet type can be controlled by selecting unicast mode or flood mode in a bridge domain?

The behavior of which packet type can be controlled by selecting unicast mode or flood mode in a bridge domain?A . ARPB . unknown unicastC . LLDPD . CDPView AnswerAnswer: B

August 3, 2018 No Comments READ MORE +

Which protocol is supported when OSPFv2 is used as the routing protocol?

Which protocol is supported when OSPFv2 is used as the routing protocol?A . NetBiosB . LATC . IPv4D . IPv6View AnswerAnswer: C

August 3, 2018 No Comments READ MORE +

You are the Office 365 administrator for your company. You manage an on-premises Microsoft Exchange Server 2003 environment that has 500 users and an externally-hosted Exchange environment that has 500 users. The hosted Exchange environment does not allow Outlook Anywhere connectivity. You do not have administrative access to all mailboxes in the hosted environment

HOTSPOT You are the Office 365 administrator for your company. You manage an on-premises Microsoft Exchange Server 2003 environment that has 500 users and an externally-hosted Exchange environment that has 500 users. The hosted Exchange environment does not allow Outlook Anywhere connectivity. You do not have administrative access to all...

August 3, 2018 No Comments READ MORE +

Which two portals can be configured to use portal FQDN? (Choose two.)

Which two portals can be configured to use portal FQDN? (Choose two.)A . adminB . sponsorC . guestD . my devicesE . monitoring and troubleshootingView AnswerAnswer: B,D

August 3, 2018 No Comments READ MORE +