In which two ways are IEEE STP BPDUs forwarded if VLAN 99 is configured as native? (Choose two.)
In which two ways are IEEE STP BPDUs forwarded if VLAN 99 is configured as native? (Choose two.)A . VLAN 1 STP BPDU tagged through VLAN 1B . VLAN 1 STP BPDU untagged through VLAN 1C . VLAN 1 STP BPDU tagged through VLAN 99D . VLAN 1 STP BPDU...
Which Check Point software blade provides protection from zero-day and undiscovered threats?
Which Check Point software blade provides protection from zero-day and undiscovered threats?A . FirewallB . Threat EmulationC . Application ControlD . Threat ExtractionView AnswerAnswer: D Explanation: SandBlast Threat Emulation As part of the Next Generation Threat Extraction software bundle (NGTX), the SandBlast Threat Emulation capability prevents infections from undiscovered exploits zero-day and targeted...
How should you implement the startup task?
DRAG DROP You need to ensure that the transcode.exe utility is installed before the worker role starts. How should you implement the startup task? (To answer, drag the appropriate values to the correct element or attribute. Each value may be used once, more than once, or not at all. You...
Given the output shown from this Cisco Catalyst 2950, what is the reason that interface FastEthernet 0/10 is not the root port for VLAN 2?
Refer to the exhibit. Given the output shown from this Cisco Catalyst 2950, what is the reason that interface FastEthernet 0/10 is not the root port for VLAN 2?A . This switch has more than one interface connected to the root network segment in VLAN 2.B . This switch is...
Which of the following describes what is meant by the ITIL Service Strategy component?
Which of the following describes what is meant by the ITIL Service Strategy component?A . Defining processes required to manage the solution.B . Designing the solution to the ITIL specifications.C . Ensuring changes are designed to meet customer expectations.D . Understanding the intended customer and what services are required.View AnswerAnswer:...
What are two valid live migration scenarios for virtual machines in your environment?
A company named Contoso, Ltd has five Hyper-V hosts that are configured as shown in the following table. What are two valid live migration scenarios for virtual machines in your environment?A . from Sever1 to server5B . from Server4 to Server 5C . from Server2 to Server3D . from Server3...
What should you do?
You have an Azure subscription that contains a storage account named STOR1 and a container name CONTAINER1. You need to monitor read access for the blobs inside CONTAINER1. The monitoring data must be retained for 10 days. What should you do?A . Run the Set-AzureStorageServiceMetricsProperty cmdlet.B . Run the New-AzureStorageBlobSASToken...
What should you do?
Your company is launching a public website that allows users to stream videos. You upload multiple video files to an Azure storage container. You need to give anonymous users read access to all of the video files in the storage container. What should you do?A . Edit each blob's metadata...
Which switch feature determines validity based on IP-to-MAC address bindings that are stored in a trusted database?
Which switch feature determines validity based on IP-to-MAC address bindings that are stored in a trusted database?A . Dynamic ARP InspectionB . storm controlC . VTP pruningD . DHCP snoopingView AnswerAnswer: A Explanation: Dynamic ARP inspection determines the validity of an ARP packet based on valid IP-to-MAC address bindings stored...
Which statement describes spread spectrum technology in wireless communications?
Which statement describes spread spectrum technology in wireless communications?A . Signal is spread across optical pulses.B . Signal is spread across variations of amplitudes.C . Signal is spread across one frequency.D . Signal is spread across a whole band of frequencies.View AnswerAnswer: D