Which three URLs can be changed?

You are the Office 365 administrator for your company. The company uses Microsoft Skype for Business Online and wants to customize Skype for Business meeting invitations. You need to identify the URLs that can be changed on the Lync meeting invitations from the Lync admin center. Which three URLs can...

March 13, 2018 No Comments READ MORE +

Which protocol does the network engineer configure on both devices to accomplish this?

A network engineer has just deployed a non-Cisco device in the network and wants to get information about it from a connected device. Cisco Discovery Protocol is not supported, so the open standard protocol must be configured. Which protocol does the network engineer configure on both devices to accomplish this?A...

March 13, 2018 No Comments READ MORE +

Which three options are default settings for NTP parameters on a Cisco device? (Choose three.)

Which three options are default settings for NTP parameters on a Cisco device? (Choose three.)A . NTP authentication is enabled.B . NTP authentication is disabled.C . NTP logging is enabled.D . NTP logging is disabled.E . NTP access is enabled.F . NTP access is disabled.View AnswerAnswer: B,D,E

March 13, 2018 No Comments READ MORE +

How many types of secondary indexes does DynamoDB support?

A scope has been handed to you to set up a super fast gaming server and you decide that you will use Amazon DynamoDB as your database. For efficient access to data in a table, Amazon DynamoDB creates and maintains indexes for the primary key attributes. A secondary index is a data...

March 13, 2018 No Comments READ MORE +

Which two types of authentication mechanisms can be used by VRRP for security? (Choose two.)

Which two types of authentication mechanisms can be used by VRRP for security? (Choose two.)A . SHA-1B . MD5C . SHA-256D . plaintext authenticationE . PEAPView AnswerAnswer: B, D

March 13, 2018 No Comments READ MORE +

An administrator is deploying port-security to restrict traffic from certain ports to specific MAC addresses. Which two considerations must an administrator take into account when using the switchport port-security macaddress sticky command? (Choose two.)

An administrator is deploying port-security to restrict traffic from certain ports to specific MAC addresses. Which two considerations must an administrator take into account when using the switchport port-security macaddress sticky command? (Choose two.)A . The configuration will be updated with MAC addresses from traffic seen ingressing the port. The...

March 13, 2018 1 Comment READ MORE +

What are two requirements needed to enable a 4 vCPU virtual machine with Fault Tolerance? (Choose two.)

What are two requirements needed to enable a 4 vCPU virtual machine with Fault Tolerance? (Choose two.)A . vSphere Enterprise Plus licenseB . 10 GbE uplink for FT logging networkC . vSphere Standard licenseD . 1 GbE uplink for FT logging networkView AnswerAnswer: A,B

March 13, 2018 No Comments READ MORE +

Using the Upgrade Wizard, which Password is required when upgrading the IP Office 500 V2?

Using the Upgrade Wizard, which Password is required when upgrading the IP Office 500 V2?A . Manager passwordB . Security passwordC . System passwordD . Administration passwordView AnswerAnswer: C

March 13, 2018 No Comments READ MORE +

Which two actions can you perform?

You manage an Office 365 tenant that uses SharePoint Online. The organization purchases a second domain name to use with SharePoint Online. You need to create a new site collection that uses the new domain name. Which two actions can you perform? Each correct answer presents a complete solution.A ....

March 13, 2018 No Comments READ MORE +