Which user agent in the HTTP headers in the requests from your internal hosts warrants further investigation?

You receive an alert for malicious code that exploits Internet Explorer and runs arbitrary code on the site visitor machine. The malicous code is on an external site that is being visited by hosts on your network. Which user agent in the HTTP headers in the requests from your internal...

May 26, 2018 No Comments READ MORE +

Which could be causing this?

An administrator attempts to manually reclaim space on thin-provisioned VMFS6 volumes but finds that no additional space is being recovered. Which could be causing this?A . vSphere 6.5 does not support manual UNMAC . The manual UNMAP operation has been moved to the vSphere web client.D . The VASA version...

May 26, 2018 No Comments READ MORE +

What should you do?

You administer a Microsoft SQL Server 2016 server. One of the databases on the server supports a highly active OLTP application. Users report abnormally long wait times when they submit data into the application. You need to identify which queries are taking longer than 1 second to run over an...

May 26, 2018 No Comments READ MORE +

ESXi supports which three iSCSI adapters? (Choose three.)

ESXi supports which three iSCSI adapters? (Choose three.)A . SoftwareB . Protocol EndpointC . FCoED . Dependent HardwareE . Independent HardwareView AnswerAnswer: A,D,E

May 26, 2018 No Comments READ MORE +

Which of the following are benefits of VLANs? (Choose three.)

Which of the following are benefits of VLANs? (Choose three.)A . They increase the size of collision domains.B . They allow logical grouping of users by function.C . They can enhance network security.D . They increase the size of broadcast domains while decreasing the number of collision domains.E . They...

May 26, 2018 No Comments READ MORE +

You plan to use VM1 as a virtual Machine Template to deploy shielded virtual machines You need to ensure that VM1 can be used to deploy shielded virtual machines What should you run?

Note: This question is part of a series of questions that use the same similar answer choices An answer choice may be correct for more than one question in the series Each question is independent of the other questions in this series. Information and details provided in a question apply...

May 26, 2018 No Comments READ MORE +

Which of the following could be the cause of the connectivity issues?

A building is equipped with light sensors that turn off the fluorescent lights when natural light is above a certain brightness. Users report experiencing network connection issues only during certain hours. The west side of the building experiences connectivity issues in the morning hours and the east side near the...

May 26, 2018 No Comments READ MORE +

Which encryption algorithm does WPA use?

Which encryption algorithm does WPA use?A . RC4B . DESC . AESD . DH5View AnswerAnswer: A

May 26, 2018 No Comments READ MORE +

In Amazon EC2, partial instance-hours are billed _____.

In Amazon EC2, partial instance-hours are billed _____.A .  per second used in the hourB .  per minute usedC .  by combining partial segments into full hoursD .  as full hoursView AnswerAnswer: D Explanation: Partial instance-hours are billed to the next hour. Reference: http://aws.amazon.com/ec2/faqs/

May 26, 2018 No Comments READ MORE +

Which of the following description of the distribution tree is correct?

Which of the following description of the distribution tree is correct?A . The multicast source is root, the multicast distribution tree that the multicast group members as leaves called RPC . The RP (Rendezvous Point) is root, the multicast distribution tree that the multicast group members as leaves called SPE...

May 26, 2018 No Comments READ MORE +