What is another term for 802.11i wireless network security?
What is another term for 802.11i wireless network security?A . 802.1xB . WEPC . TKIPD . WPAE . WPA2View AnswerAnswer: E
Which of the following protocols do MOST MITM attacks utilize?
Which of the following protocols do MOST MITM attacks utilize?A . ARPB . SIPC . FTPD . SCPView AnswerAnswer: A
Which three name services are supported with NFS? (Choose three.)
Which three name services are supported with NFS? (Choose three.)A . NetBIOSB . WINSC . External NIS domains (NIS)D . External LDAP domains (LDAP)E . Local Users (file)View AnswerAnswer: CDE
For which situation will the system display a prompt before reaching the Case Resolution window?
You are attempting to resolve a case. For which situation will the system display a prompt before reaching the Case Resolution window?A . The case has a service-level agreement {SLA) that was not met.B . The case has an open activity.C . The customer will exceed their entitlement allotmentD ....
What is the minimum amount of extra disk capacity required to accommodate extending the volume?
You create a Storage Spaces Direct hyper-converged failover cluster. The duster contains three nodes and a 1-TB Storage Spaces Direct volume. The cluster will store virtual machines. You plan to extend the volume by adding an additional 3 TB. What is the minimum amount of extra disk capacity required to...
Your company has a hybrid deployment of Office 365. All mailboxes are hosted on Office 365. All users access their Office 365 mailbox by using a user account that is hosted on-premises. You need to delete a user account and its associated mailbox. Which tool should you use?
Your company has a hybrid deployment of Office 365. All mailboxes are hosted on Office 365. All users access their Office 365 mailbox by using a user account that is hosted on-premises. You need to delete a user account and its associated mailbox. Which tool should you use?A . The...
To which folder location should you deploy CleanLogs.cmd?
You administer an Azure Web Site named contoso. You create a job named Cleanlogs.cmd that will be executed manually, twice a week. You need to deploy the job. To which folder location should you deploy CleanLogs.cmd?A . ./App_Code/jobs/triggered/cleanLogs/CleanLogs.cmdB . ./App_Data/jobs/triggered/clean Logs/CleanLogs.cmdC . ./App_Code/jobs/continuous/cleanLogs/CleanLogs.cmdD . ./App_Data/jobs/continuous/cleanLogs/CleanLogs.cmdView AnswerAnswer: B Explanation: A WebJob...
Which condition triggers wireless authentication?
Which condition triggers wireless authentication?A . NAS-Port-Type is set to IEEE 802.11.B . Framed-Compression is set to None.C . Service-Type is set to Framed.D . Tunnel-Type is set to VLAView AnswerAnswer: A
During which type of survey does the surveyor interact with the infrastructure?
During which type of survey does the surveyor interact with the infrastructure?A . planningB . activeC . passiveD . predictiveView AnswerAnswer: B
Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment?
A network engineer is extending a LAN segment between two geographically separated data centers. Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment?A . Modify the spanning-tree priorities to dictate the traffic flow.B . Create a Layer 3 transit VLAN to segment the traffic...