What should you use?

You have Hyper-V virtual machines that run 50 web servers, 10 Microsoft SQL Server servers. 10 file servers, and eight domain controllers. You need to implement a backup strategy that meets the following requirements: * Backs up all servers * Centralizes backup management * Performs application-level backups * Provides the...

April 29, 2018 No Comments READ MORE +

An administrator has created a custom IPS signature. Where does the custom IPS signature have to be applied?

An administrator has created a custom IPS signature. Where does the custom IPS signature have to be applied?A . In an IPS sensorB . In an interface.C . In a DoS policy.D . In an application control profile.View AnswerAnswer: A

April 29, 2018 No Comments READ MORE +

In a mesh BSS (MBSS), according to the 802.11-2016 standard, what device connect the mesh to an Ethernet network?

In a mesh BSS (MBSS), according to the 802.11-2016 standard, what device connect the mesh to an Ethernet network?A . Mesh GateB . Mesh SwitchC . Mesh RouterD . Mesh PortalView AnswerAnswer: B

April 29, 2018 No Comments READ MORE +

How many decibels would the 3-mW AP need its power increased to match the 60-mW AP?

A network engineer notices that two mesh APs are having problems communicating. After reviewing the current radio configurations, it is noted that one AP is transmitting at 3 mW while the other is transmitting at 60 mW. How many decibels would the 3-mW AP need its power increased to match...

April 29, 2018 No Comments READ MORE +

What should you do for improved security?

You are configuring SNMPv1/v2c on a WLC. What should you do for improved security?A . Remove the default SNMPv1 community.B . Remove the default SNMPv1 and SNMPv2 communities.C . Remove the default SNMPv2 community.D . Remove the default SNMPv3 users.View AnswerAnswer: B

April 29, 2018 No Comments READ MORE +

When a guest client is authenticated, which type of connection is created between the controller-based AP and the client?

When a guest client is authenticated, which type of connection is created between the controller-based AP and the client?A . as SSL connectionB . a TLS encrypted tunnelC . an unsecured connectionD . a 802.1x/EAP tunnelE . an IPsec tunnelView AnswerAnswer: C

April 29, 2018 No Comments READ MORE +

Which three configuration elements are required?

A network engineer is configuring HTTP based CWA on a switch. Which three configuration elements are required? (Choose three.)A . HTTP server enabledB . Radius authentication on the port with MABC . Redirect access-listD . Redirect-URLE . HTTP secure server enabledF . Radius authentication on the port with 802.1xG ....

April 29, 2018 No Comments READ MORE +

Which IP address and which subnet mask should you identify?

HOTSPOT Your company has a branch office that has three floors. The office currently uses a different subnet on each floor. The subnets are configured as shown in the following table. You have been asked to use reconfigure the network to use one subnet that encompasses all three floors. The...

April 29, 2018 No Comments READ MORE +

Which five actions should you perform in sequence?

DRAG DROP You are developing an ASP.NET MVC application that allows users to log on by using a third-party authenticator. You need to configure Microsoft Azure Access Control Services and the application. Which five actions should you perform in sequence? (To answer, move the appropriate actions from the list of...

April 29, 2018 No Comments READ MORE +

Which statement is true when one of its virtual gateway redundancy with an AVF has failed?

Which statement is true when one of its virtual gateway redundancy with an AVF has failed?A . If an AVF has failed, one of the primary virtual forwarders in the listen state assumes responsibility for the virtual MAC address.B . If an AVF has failed, one of the secondary virtual...

April 29, 2018 No Comments READ MORE +