What is another term for 802.11i wireless network security?

What is another term for 802.11i wireless network security?A . 802.1xB . WEPC . TKIPD . WPAE . WPA2View AnswerAnswer: E

May 14, 2018 No Comments READ MORE +

Which of the following protocols do MOST MITM attacks utilize?

Which of the following protocols do MOST MITM attacks utilize?A . ARPB . SIPC . FTPD . SCPView AnswerAnswer: A

May 14, 2018 No Comments READ MORE +

Which three name services are supported with NFS? (Choose three.)

Which three name services are supported with NFS? (Choose three.)A . NetBIOSB . WINSC . External NIS domains (NIS)D . External LDAP domains (LDAP)E . Local Users (file)View AnswerAnswer: CDE

May 14, 2018 No Comments READ MORE +

For which situation will the system display a prompt before reaching the Case Resolution window?

You are attempting to resolve a case. For which situation will the system display a prompt before reaching the Case Resolution window?A . The case has a service-level agreement {SLA) that was not met.B . The case has an open activity.C . The customer will exceed their entitlement allotmentD ....

May 14, 2018 No Comments READ MORE +

What is the minimum amount of extra disk capacity required to accommodate extending the volume?

You create a Storage Spaces Direct hyper-converged failover cluster. The duster contains three nodes and a 1-TB Storage Spaces Direct volume. The cluster will store virtual machines. You plan to extend the volume by adding an additional 3 TB. What is the minimum amount of extra disk capacity required to...

May 14, 2018 No Comments READ MORE +

Your company has a hybrid deployment of Office 365. All mailboxes are hosted on Office 365. All users access their Office 365 mailbox by using a user account that is hosted on-premises. You need to delete a user account and its associated mailbox. Which tool should you use?

Your company has a hybrid deployment of Office 365. All mailboxes are hosted on Office 365. All users access their Office 365 mailbox by using a user account that is hosted on-premises. You need to delete a user account and its associated mailbox. Which tool should you use?A . The...

May 14, 2018 No Comments READ MORE +

To which folder location should you deploy CleanLogs.cmd?

You administer an Azure Web Site named contoso. You create a job named Cleanlogs.cmd that will be executed manually, twice a week. You need to deploy the job. To which folder location should you deploy CleanLogs.cmd?A . ./App_Code/jobs/triggered/cleanLogs/CleanLogs.cmdB . ./App_Data/jobs/triggered/clean Logs/CleanLogs.cmdC . ./App_Code/jobs/continuous/cleanLogs/CleanLogs.cmdD . ./App_Data/jobs/continuous/cleanLogs/CleanLogs.cmdView AnswerAnswer: B Explanation: A WebJob...

May 14, 2018 No Comments READ MORE +

Which condition triggers wireless authentication?

Which condition triggers wireless authentication?A . NAS-Port-Type is set to IEEE 802.11.B . Framed-Compression is set to None.C . Service-Type is set to Framed.D . Tunnel-Type is set to VLAView AnswerAnswer: A

May 14, 2018 No Comments READ MORE +

During which type of survey does the surveyor interact with the infrastructure?

During which type of survey does the surveyor interact with the infrastructure?A . planningB . activeC . passiveD . predictiveView AnswerAnswer: B

May 14, 2018 No Comments READ MORE +

Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment?

A network engineer is extending a LAN segment between two geographically separated data centers. Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment?A . Modify the spanning-tree priorities to dictate the traffic flow.B . Create a Layer 3 transit VLAN to segment the traffic...

May 14, 2018 No Comments READ MORE +