Does the solution meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
What happens to data on an ephemeral volume of an EBS-backed EC2 instance if it is terminated or if it fails?
What happens to data on an ephemeral volume of an EBS-backed EC2 instance if it is terminated or if it fails?A . Data is automatically copied to another volume.B . The volume snapshot is saved in S3.C . Data persists.D . Data is deleted.View AnswerAnswer: D Explanation: Any data on the...
You are configuring a Cisco IOS Firewall on a WAN router that is operating as a Trusted Relay Point (TRP) in a voice network. Which feature must you configure to open data-channel pinholes for voice packets that are sourced from a TRP within the WAN?
You are configuring a Cisco IOS Firewall on a WAN router that is operating as a Trusted Relay Point (TRP) in a voice network. Which feature must you configure to open data-channel pinholes for voice packets that are sourced from a TRP within the WAN?A . CACB . ACLC ....
What should be done to resolve this problem?
A BMC interface webpage is reachable but unresponsive. What should be done to resolve this problem?A . NDU to latest bundle of VxRail softwareB . Reboot the nodeC . Reset the BMC through/tmp/vspexblue/bin/ipmitool mc reset coldD . Upgrade the BMC firmwareView AnswerAnswer: D
Which three algorithms should be avoided due to security concerns? (Choose three.)
Which three algorithms should be avoided due to security concerns? (Choose three.)A . DES for encryptionB . SHA-1 for hashingC . 1024-bit RSAD . AES GCM mode for encryptionE . HMAC-SHA-1F . 256-bit Elliptic Curve Diffie-HellmanG . 2048-bit Diffie-HellmanView AnswerAnswer: A,B,C
What should you recommend?
You are designing a solution that will aggregate and analyze data from Internet of Things (IoT) devices. The solution must meet the following requirements: ・ Store petabytes of data ・ Use shared access policies to provide service connections to the IoT event source. ・ Conduct analysis of data in near...
What is the difference between deterministic and probabilistic assessment method?
What is the difference between deterministic and probabilistic assessment method?A . At deterministic method we know the facts beforehand and at probabilistic method we make assumptionsB . At probabilistic method we know the facts beforehand and at deterministic method we make assumptionsC . Probabilistic method has an absolute natureD ....
What should you do?
You have two Hyper-V hosts named Server1 and Server2 that run Windows Server 2016. Server1 and Server2 are connected to the same network. On Server1 and Server2, you create an external network switch named Switch1. You have the virtual machines shown in the following table. All three virtual machines are...
Which three statements about HSRP operation are true? (Choose three.)
Which three statements about HSRP operation are true? (Choose three.) A. The virtual IP address and virtual MA+K44C address are active on the HSRP Master router. B. The HSRP default timers are a 3 second hello interval and a 10 second dead interval. C. HSRP supports only clear-text authentication. D....
Which line in the output indicates that the send queue is full and export packets are not being sent?
A network engineer executes the show ip flow export command. Which line in the output indicates that the send queue is full and export packets are not being sent?A . output dropsB . enqueuing for the RPC . fragmentation failuresD . adjacency issuesView AnswerAnswer: A Explanation: Table 5 show ip...