Which rule types should you configure on each side of the federated trust?

DRAG DROP Your network contains two Active Directory forests named contoso.com and adatum.com. All domain controllers run Windows Server 2012 R2. A federated trust exists between adatum.com and contoso.com. The trust provides adatum.com users with access to contoso.com resources. You need to configure Active Directory Federation Services (AD FS) claim...

August 18, 2018 No Comments READ MORE +

A DSCP value of 41 in decimal corresponds to which IP precedence value?

A DSCP value of 41 in decimal corresponds to which IP precedence value?A . 3 C FlashB . 4 C Flash OverrideC . 5 C CriticalD . 6 C Internet ControlE . 7 C Network ControlView AnswerAnswer: C

August 18, 2018 No Comments READ MORE +

\Server1.adatum.comnamespace1 has a folder target maned Folder1. A user named User1 has Full Control share and NTFS permissions to Folder1

HOTSPOT Refer to Exhibit: \Server1.adatum.comnamespace1 has a folder target maned Folder1. A user named User1 has Full Control share and NTFS permissions to Folder1. Folder1 contains a file named File1.doc. User1 has only Write NTFS permissions to File1.doc. Use the drop-down menus to select the answer choice that completes each...

August 18, 2018 No Comments READ MORE +

Why is the EtherChannel bundle not working?

After an EtherChannel is configured between two Cisco switches, interface port channel 1 is in the down/ down state. Switch A is configured with channel-group 1 mode active, while Switch B is configured with channel-group 1 mode desirable. Why is the EtherChannel bundle not working?A . The switches are using...

August 18, 2018 No Comments READ MORE +

Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. You have an organizational unit (OU) named TestOU that contains test computers. You need to enable a technician named Tech1 to create Group Policy objects (GPOs) and to link the GPOs to TestOU. The solution must use the principle of least...

August 18, 2018 No Comments READ MORE +

Which four actions should you perform in sequence?

DRAG DROP You administer a Microsoft SQL Server 2012 instance that contains a database of confidential data. You need to encrypt the database files at the page level. You also need to encrypt the transaction log files. Which four actions should you perform in sequence? (To answer, move the appropriate...

August 18, 2018 No Comments READ MORE +

What statement is true if a new switch with a lower bridge ID is introduced in a network with root guard enhancement?

What statement is true if a new switch with a lower bridge ID is introduced in a network with root guard enhancement?A . Prevent unknown switch be a root portB . Root Guard puts the port into root-inconsistentC . Allow two root bridges in a networkD . All ports of...

August 18, 2018 No Comments READ MORE +

Your network contains an Active Directory forest. The forest contains one domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. DC1 holds all of the operations master roles

HOTSPOT Your network contains an Active Directory forest. The forest contains one domain named contoso.com. The domain contains two domain controllers named DC1 and DC2. DC1 holds all of the operations master roles. During normal network operations, you run the following commands on DC2: Move-ADDirectoryServerOperationMasterRole -Identity “DC2” -OperationMasterRole PDCEmulator Move-...

August 18, 2018 No Comments READ MORE +

A service cell A to neighboring area B is switched too late. Which of the following parameter modification is correct? (Multiple Choice)

A service cell A to neighboring area B is switched too late. Which of the following parameter modification is correct? (Multiple Choice)A . Time to Triger changed from 320ms to 640msB . Time to Triger changed from 320ms to 120msC . Set the CIO (Ocn) value of the B cell...

August 18, 2018 No Comments READ MORE +

Which key protector option should you use?

You are the network administrator for Contoso, Ltd. Many users have Windows 10 Enterprise laptops, and your IT department configures all of them to use BitLocker on all fixed drives. Many users carry sensitive corporate data on their USB drives. You need to enable BitLocker for these USB drives. Which...

August 18, 2018 No Comments READ MORE +