Which option do Specs-based and third-party Specs-based servers require?

Which option do Specs-based and third-party Specs-based servers require?A . nothingB . DHCPC . VMwareD . Cisco IMC supervisorView AnswerAnswer: C

March 31, 2018 No Comments READ MORE +

Which solution should the technical specialist propose?

A customer wants to enable encryption on its IBM Storwize V7000. The customer has an IBM Storwize V7000 Gen1 control enclosure and three Gen1 expansion enclosures. Which solution should the technical specialist propose?A . Replace the whole system with a Gen2 and enable the encryption license on the new system.B...

March 31, 2018 No Comments READ MORE +

Which of the following should Jeff consider to get the BEST signal strength?

Jeff, a network technician, is installing a wireless router. Which of the following should Jeff consider to get the BEST signal strength?A . WAP placementB . PoE devicesC . MAC filteringD . Encryption typeView AnswerAnswer: A

March 31, 2018 No Comments READ MORE +

What are the mechanisms available for access control on AWS S3?

You have some very sensitive data stored on AWS S3 and want to try every possible alternative to keeping it secure in regards to access control. What are the mechanisms available for access control on AWS S3?A .  (IAM) policies, Access Control Lists (ACLs), bucket policies, and query string authentication.B .  (IAM)...

March 31, 2018 No Comments READ MORE +

Which statement about the use of PAgP link aggregation on a Cisco switch that is running Cisco IOS Software is true?

Which statement about the use of PAgP link aggregation on a Cisco switch that is running Cisco IOS Software is true?A . PAgP modes are off, auto, desirable, and on. Only the combinations auto-desirable, desirable-desirable, and on-on allow the formation of a channel.B . PAgP modes are active, desirable, and...

March 31, 2018 No Comments READ MORE +

What are two types of attacks against wireless networks that can be prevented by a WLC? (choose two)

What are two types of attacks against wireless networks that can be prevented by a WLC? (choose two)A . Layer 3 flooding attacksB . DHCP rogue server attacksC . IP spoofing attacksD . Inverse ARP attacks on specific portsE . ARP sniffing attacks on specific portsView AnswerAnswer: BC

March 31, 2018 No Comments READ MORE +

Which two actions should you perform?

You are the Office 365 administrator for Contoso, Ltd. Some email messages sent from the trusted domain fabrikam.com are being rejected as spam. Some of these email messages originate inside the fabrikam.com network, and some of them originate from an application in the fabrikam.com co-located data center. The fabrikam.com systems...

March 31, 2018 No Comments READ MORE +

What should you do?

You work as a Database Administrator (DBA) for a company named ABC.com. The company uses a Microsoft SQL Server 2012 infrastructure. You have a database named CorpDB. CorpDB contains 2TB of data. You plan to import a large amount of data into tables in CorpDB. You want to minimize the...

March 31, 2018 No Comments READ MORE +

How should you complete the JSON configuration code?

DRAG DROP Your company is implementing an Intrusion Detection System (IDS). The IDS has the IP address 192.168.3.92. You plan to deploy the network by using Azure Resource Manager (ARM). You need to ensure that all subnet traffic goes through the IDS. How should you complete the JSON configuration code?...

March 31, 2018 No Comments READ MORE +