What should you do?
Your network contains an Active Directory domain named adatum.com. The domain contains a member server named Server1 and 10 web servers. All of the web servers are in an organizational unit (OU) named WebServers_OU. All of the servers run Windows Server 2012 R2. On Server1, you need to collect the...
What must be done to accomplish this?
An administrator has connected devices to a switch and, for security reasons, wants the dynamically learned MAC addresses from the address table added to the running configuration. What must be done to accomplish this?A . Enable port security and use the keyword sticky.B . Set the switchport mode to trunk...
Which audience type does this group member belong to?
You are proposing a solution to a group that conflicts with a competing intiative of one of the group members. Which audience type does this group member belong to?A . CriticalB . HostileC . UninformedD . sympatheticView AnswerAnswer: B Explanation: Audience Types The assessment of different audience types helps to...
What should you run?
You have a server named Server1 that runs a Server Core installation of Windows Server 2012 R2. Server1 is configured to obtain an IPv4 address by using DHCP. You need to configure the IPv4 settings of the network connection on Server1 as follows: • IP address: 10.1.1.1 • Subnet mask:...
Which two configurations should you perform from DNS Manager?
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. DC1 has the DNS Server role installed. The network contains client computers that run either Linux, Windows 7, or Windows 8. You have a standard primary zone...
Which option is a misuse variety per VERIS enumerations?
Which option is a misuse variety per VERIS enumerations?A . snoopingB . hackingC . theftD . assaultView AnswerAnswer: B
For each authentication method, which option should you use?
DRAG DROP You need to ensure that users can share sales data. For each authentication method, which option should you use? To answer, drag the appropriate option to the correct authentication method. Each option may be used once, more than once, or not at all. You may need to drag the split bar between panes or...
Which two actions should you perform?
Your network contains an Active Directory forest named contoso.com. The forest contains a single domain. All servers run Windows Server 2012 R2. The domain contains two domain controllers named DC1 and DC2. Both domain controllers are virtual machines on a Hyper-V host. You plan to create a cloned domain controller...
What should you do on Server1?
Your network contains a server named Server1 that runs Windows Server 2012. Server1 has the Network Policy Server role installed. You configure Server1 as part of a Network Access Protection (NAP) solution that uses the 802.lx enforcement method, You add a new switch to the network and you configure the...
The behavior of which packet type can be controlled by selecting unicast mode or flood mode in a bridge domain?
The behavior of which packet type can be controlled by selecting unicast mode or flood mode in a bridge domain?A . ARPB . unknown unicastC . LLDPD . CDPView AnswerAnswer: B