What should you do?
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All domain controllers run Windows Server 2012 R2. The domain contains two domain controllers. The domain controllers are configured as shown in the following table. Active Directory Recycle Bin is enabled. You discover that a...
Which activation model should you use for the virtual machines?
You deploy a Hyper-V server named Server1 in an isolated test environment. The test environment is prevented from accessing the Internet. Server1 runs the Datacenter edition of Windows Server 2016. You plan to deploy the following guest virtual machines on the server: Which activation model should you use for the...
About Huawei 2.0+ advantage, Which description is correct? (Multiple choice)
About Huawei 2.0+ advantage, Which description is correct? (Multiple choice)A . data on the hard disk storage pools automatically load balancing, avoiding hard disk uneven cold and heat, thus reducing the failure rate of storage system as a wholeB . overcome the target disk (hot standby) performance bottlenecks of traditional...
What should you do?
You are the Office 365 administrator for your company. You need to configure Microsoft Lync Online to disable alerts for voicemail and instant messages to Windows Phones. What should you do?A . In the Lync admin center, disable the Microsoft Push Notification Service.B . Use the Set-CsPrivacyConfiguration Windows PowerShell cmdlet.C...
Which IPv6 mechanism occurs between a provider edge router and the customer premises equipment router to allow an ISP to automate the process of assigning a block of IPv6 addresses to a customer for use within the customer network?
Which IPv6 mechanism occurs between a provider edge router and the customer premises equipment router to allow an ISP to automate the process of assigning a block of IPv6 addresses to a customer for use within the customer network?A . Router AdvertisementB . DHCPv6 Prefix DelegationC . DHCPv6 LiteD ....
What features can protect the data plane? (Choose three.)
What features can protect the data plane? (Choose three.)A . policingB . ACLsC . IPSD . antispoofingE . QoSF . DHCP-snoopingView AnswerAnswer: B,D,F
When monitoring the OSPF operations in the network, you notice that the OSPF process is not load balancing traffic across multiple OSPF links. Which configuration adjustment could be made to enable the OSPF process to load balance traffic across multiple OSPF links?
When monitoring the OSPF operations in the network, you notice that the OSPF process is not load balancing traffic across multiple OSPF links. Which configuration adjustment could be made to enable the OSPF process to load balance traffic across multiple OSPF links?A . Enable BFD on the OSPF interfaces and...
A network administrator configures an email server to use secure protocols. When the upgrade is completed, which of the following ports on the firewall should be configured to allow for connectivity? (Choose three.)
A network administrator configures an email server to use secure protocols. When the upgrade is completed, which of the following ports on the firewall should be configured to allow for connectivity? (Choose three.)A . TCP 25B . TCP 110C . TCP 143D . TCP 389E . TCP 587F . TCP...
Where are the main fault logs for root cause analysis located?
Where are the main fault logs for root cause analysis located?A . on your local computer via an SSH sessionB . on the server where the application is installedC . on the database serverD . on the switch that connects the database and application serverView AnswerAnswer: B
Upgrade both vCenter Servers to 6.5.
Upgrade both vCenter Servers to 6.5.View AnswerAnswer: D