Which three URLs can be changed?
You are the Office 365 administrator for your company. The company uses Microsoft Skype for Business Online and wants to customize Skype for Business meeting invitations. You need to identify the URLs that can be changed on the Lync meeting invitations from the Lync admin center. Which three URLs can...
Which protocol does the network engineer configure on both devices to accomplish this?
A network engineer has just deployed a non-Cisco device in the network and wants to get information about it from a connected device. Cisco Discovery Protocol is not supported, so the open standard protocol must be configured. Which protocol does the network engineer configure on both devices to accomplish this?A...
Which three options are default settings for NTP parameters on a Cisco device? (Choose three.)
Which three options are default settings for NTP parameters on a Cisco device? (Choose three.)A . NTP authentication is enabled.B . NTP authentication is disabled.C . NTP logging is enabled.D . NTP logging is disabled.E . NTP access is enabled.F . NTP access is disabled.View AnswerAnswer: B,D,E
Which three options are products and benefits of the data center threat-centric solution? (Choose three.)
Which three options are products and benefits of the data center threat-centric solution? (Choose three.)A . deep visibility and data analytics through StealthwatchB . identity-based policy management through MerakiC . automated policy enforcement with ASAvD . deep malware defense with TalosE . predictive intelligence through Umbrella and TalosF . software-defined...
How many types of secondary indexes does DynamoDB support?
A scope has been handed to you to set up a super fast gaming server and you decide that you will use Amazon DynamoDB as your database. For efficient access to data in a table, Amazon DynamoDB creates and maintains indexes for the primary key attributes. A secondary index is a data...
Which two types of authentication mechanisms can be used by VRRP for security? (Choose two.)
Which two types of authentication mechanisms can be used by VRRP for security? (Choose two.)A . SHA-1B . MD5C . SHA-256D . plaintext authenticationE . PEAPView AnswerAnswer: B, D
An administrator is deploying port-security to restrict traffic from certain ports to specific MAC addresses. Which two considerations must an administrator take into account when using the switchport port-security macaddress sticky command? (Choose two.)
An administrator is deploying port-security to restrict traffic from certain ports to specific MAC addresses. Which two considerations must an administrator take into account when using the switchport port-security macaddress sticky command? (Choose two.)A . The configuration will be updated with MAC addresses from traffic seen ingressing the port. The...
What are two requirements needed to enable a 4 vCPU virtual machine with Fault Tolerance? (Choose two.)
What are two requirements needed to enable a 4 vCPU virtual machine with Fault Tolerance? (Choose two.)A . vSphere Enterprise Plus licenseB . 10 GbE uplink for FT logging networkC . vSphere Standard licenseD . 1 GbE uplink for FT logging networkView AnswerAnswer: A,B
Using the Upgrade Wizard, which Password is required when upgrading the IP Office 500 V2?
Using the Upgrade Wizard, which Password is required when upgrading the IP Office 500 V2?A . Manager passwordB . Security passwordC . System passwordD . Administration passwordView AnswerAnswer: C
Which two actions can you perform?
You manage an Office 365 tenant that uses SharePoint Online. The organization purchases a second domain name to use with SharePoint Online. You need to create a new site collection that uses the new domain name. Which two actions can you perform? Each correct answer presents a complete solution.A ....