Which of the following is needed to protect BOTH the employee and the company?

An employee wishes to use a personal cell phone for work-related purposes, including storage of sensitive company data, during long business trips. Which of the following is needed to protect BOTH the employee and the company?A . An NDA ensuring work data stored on the personal phone remains confidentialB ....

March 12, 2018 No Comments READ MORE +

What three configurations are supported when using these devices?

ESXi 6.5 introduces VMFS6, which supports both 512e and 512n devices. What three configurations are supported when using these devices? (Choose three.)A . Hosts with both 512e and 512n devices.B . Storage vMotion between both 512e and 512n devices.C . Datastore Extents spanned between both 512e and 512n devices.D ....

March 12, 2018 No Comments READ MORE +

Which of the following is the BEST technology for the network administrator to implement?

When choosing a type of storage that integrates with the existing network infrastructure, the storage must be easily configurable to share files and can communicate with all existing clients over TCP/IP. Which of the following is the BEST technology for the network administrator to implement?A . iSCSIB . Fibre ChannelC...

March 12, 2018 No Comments READ MORE +

What is the output of this code?

What is the output of this code? $world = 'world'; echo <<<'TEXT' hello $world TEXT;A . hello worldB . hello $worldC . PHP Parser errorView AnswerAnswer: C

March 12, 2018 No Comments READ MORE +

What should you recommend?

You are evaluating an Azure application. The application includes the following elements: *A web role that provides the ASP.NET user interface and business logic *A single SQL database that contains all application data Each webpage must receive data from the business logic layer before returning results to the client. Traffic...

March 12, 2018 No Comments READ MORE +

Which of the following description of the challenges for the cloud data center network is wrong?

Which of the following description of the challenges for the cloud data center network is wrong?A . Big data requires big pipesB . Business innovation requires network agilityC . Diversification requires an open networkD . Cloud data center requires the device to fully support forwarding control separationView AnswerAnswer: D

March 12, 2018 No Comments READ MORE +

Which host mode must be active on the port?

After an endpoint has completed authentication with MAB, a security violation is triggered because a different MAC address was detected. Which host mode must be active on the port?A . single-host modeB . multidomain authentication host modeC . multiauthentication host modeD . multihost modeView AnswerAnswer: A

March 12, 2018 No Comments READ MORE +

Which command output shows the interface assigned as the designated receiver of each VLAN?

Which command output shows the interface assigned as the designated receiver of each VLAN?A . show system vlan reservedB . show vlan internal bd-info bd-to-vlan all-bdC . show port internal info allD . show platform software enm internal info vlandb allView AnswerAnswer: D

March 12, 2018 No Comments READ MORE +

Which Cisco product can help mitigate web-based attacks within a network?

Which Cisco product can help mitigate web-based attacks within a network?A . Adaptive Security ApplianceB . Web Security ApplianceC . Email Security ApplianceD . Identity Services EngineView AnswerAnswer: B

March 12, 2018 No Comments READ MORE +

Which of the following authentication modes does VRRP use?

Which of the following authentication modes does VRRP use?A . No authenticationB . Simple text passwordC . MD5D . CHAPView AnswerAnswer: ABC

March 12, 2018 No Comments READ MORE +