What two files are created when the Take snapshot operation is executed? (Choose two.)

What two files are created when the Take snapshot operation is executed? (Choose two.)A . .delta.vmdkB . .nvramC . .vmsnD . .lckView AnswerAnswer: A,C

May 7, 2018 No Comments READ MORE +

Refer to the following topology and configuration, the router R1 and R2 connect via Serial low-speed cable, and the data link layer encapsulation using PPP. When R1 and R2 Holdtime inconsistent, APP negotiation fails, can not communicate.

Refer to the following topology and configuration, the router R1 and R2 connect via Serial low-speed cable, and the data link layer encapsulation using PPP. When R1 and R2 Holdtime inconsistent, APP negotiation fails, can not communicate. A . TrueB . FalseView AnswerAnswer: B

May 7, 2018 No Comments READ MORE +

About the description of well-known attributes in BGP, which is correct? (Multiple Choice)

About the description of well-known attributes in BGP, which is correct? (Multiple Choice)A . The well-known attributes are divided into two types: recognized mandatory and optional transition.B . BGP must recognize all well-known attributes.C . Well-known attributes are identifiled by all BGP routers and must exist in the Update message.D...

May 7, 2018 No Comments READ MORE +

What should you recommend?

You deploy a SQL Server instance named SQLProd that uses SQL Server 2014. You need to recommend a solution to monitor the transactions that are running currently against SQLProd. The solution must minimize the amount of custom code required. What should you recommend?A . StatisticsB . A dynamic management viewC...

May 7, 2018 No Comments READ MORE +

What are two security threats to wireless networks? (Choose two.)

What are two security threats to wireless networks? (Choose two.)A . ad-hoc networksB . client misassociationC . port redirectionD . cross-site scriptingView AnswerAnswer: A, B

May 7, 2018 No Comments READ MORE +

Which of the following AP mode does not belong to WDS network()?

Which of the following AP mode does not belong to WDS network()?A . Root APB . Middle APC . Bridge APD . Leaf APView AnswerAnswer: C

May 7, 2018 No Comments READ MORE +

Which two actions can improve network performance?

A network design team is experiencing sustained congestion on access and distribution uplinks. QoS has already been implemented and optimized, and it is no longer effective in ensuring optimal network performance. Which two actions can improve network performance? (Choose two.)A . Reconfigure QoS based on the IntServ model.B . Configure...

May 7, 2018 No Comments READ MORE +

What should be part of a comprehensive network security plan?

What should be part of a comprehensive network security plan?A . Allow users to develop their own approach to network security.B . Physically secure network equipment from potential access by unauthorized individualsC . Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten.D...

May 7, 2018 No Comments READ MORE +

Which port should to open on the firewall?

You have two servers named Server1 and Server2. A firewall exists between Server1 and Server2. Both servers run Windows Server Update Services (WSUS). Server1 downloads updates from Microsoft update. Server2 must synchronize updates from Server1. Which port should to open on the firewall?A . 80B . 443C . 3389D ....

May 7, 2018 No Comments READ MORE +

What are the two different modes in the private AMP cloud can be deployed? (Choose two)

What are the two different modes in the private AMP cloud can be deployed? (Choose two)A . Air Gap ModeB . External ModeC . Internal ModeD . Public modeE . Cloud modeF . Cloud proxy modeView AnswerAnswer: AF

May 7, 2018 No Comments READ MORE +