Which method should you identity for each access type?

You are implementing security for an Azure Cosmos DB account that uses the SQL API. The account has the following collections: - Movies A collection of move information - Reviews A collection of move review information You identify three types of access for Cosmos DB as shown in the following...

August 5, 2018 No Comments READ MORE +

Which of the following technologies is required to allow all ports of a single private IP to be publically accessible via a single public IP?

Which of the following technologies is required to allow all ports of a single private IP to be publically accessible via a single public IP?A . NATB . RIPC . PATD . ACLView AnswerAnswer: C

August 5, 2018 No Comments READ MORE +

What two operations will the switch perform when it receives this frame?

Refer to the exhibit. The ports that are shown are the only active ports on the switch. The MAC address table is shown in its entirety. The Ethernet frame that is shown arrives at the switch. What two operations will the switch perform when it receives this frame? (Choose two.)A...

August 5, 2018 No Comments READ MORE +

A WLAN engineer has been asked to upgrade the software on a MSE 3365 Appliance. The engineer cannot access the system using the root password and the Grub password as the details had never been documented. How should the engineer perform the password recovery?

A WLAN engineer has been asked to upgrade the software on a MSE 3365 Appliance. The engineer cannot access the system using the root password and the Grub password as the details had never been documented. How should the engineer perform the password recovery?A . Use a console cable.B ....

August 5, 2018 No Comments READ MORE +

What should you create first?

You have an exchange server 2016 organization. The organization contains a Mailbox server named EX01. EX01 contains a mailbox database named DB01. The volume that contains DB01 fails. You need to perform a dial-tone recovery of the database. What should you create first?A . a new Recovery Storage GroupB ....

August 5, 2018 No Comments READ MORE +

Which of the following MUST be used when securing a VoIP network consisting of private IP addresses?

Which of the following MUST be used when securing a VoIP network consisting of private IP addresses?A . IPSB . Application layer firewallC . IDSD . An unmanaged switchView AnswerAnswer: B

August 5, 2018 No Comments READ MORE +

In an NFV environment, what is the role of an SDN controller?

In an NFV environment, what is the role of an SDN controller?A . Dynamically controls all of the software componentsB . Spins up the VMs that are required to build the NFVsC . Dynamically scales up and scales down VM resourcesD . Connects the virtualized networking devices through a common...

August 5, 2018 No Comments READ MORE +

What can the host do to improve the reliability of this communication session?

A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?A . decrease the window sizeB . use a different source port for the sessionC . decrease the sequence numberD . obtain a...

August 5, 2018 No Comments READ MORE +