If all ESXi hosts in group “Y” fail, which is the resulting behavior with vSphere HA enabled?
A VM-Host affinity rule states that VM group “X” must run on hosts in group “Y”. If all ESXi hosts in group “Y” fail, which is the resulting behavior with vSphere HA enabled? A. The virtual machines in group “X” will failover to hosts that do not belong to group...
With which technology do apply integrity, confidentially and authenticate the source
With which technology do apply integrity, confidentially and authenticate the sourceA . IPSecB . IKEC . Certificate authorityD . Data encryption standardsView AnswerAnswer: A
What should you include in the recommendation?
You have a SQL Server 2012 database named DB1. You plan to import a large number of records from a SQL Azure database to DB1. You need to recommend a solution to minimize the amount of space used in the transaction log during the import operation. What should you include...
iSCSI device automatically loads during the system start-up.
iSCSI device automatically loads during the system start-up.View AnswerAnswer:
Which solution ensures that the server maintains network reachability in the future?
A server with a statically assigned IP address is attached to a switch that is provisioned for DHCP snooping. For more protection against malicious attacks, the network team is considering enabling dynamic ARP inspection alongside DHCP snooping. Which solution ensures that the server maintains network reachability in the future?A ....
In which part of the ADM cycle do building block gaps become associated with work packages that will address the gaps?
In which part of the ADM cycle do building block gaps become associated with work packages that will address the gaps?A . Preliminary Phase and Phase AB . Phases B, C, and DC . Phase ED . Phase FE . Phases G and HView AnswerAnswer: C
In a security context, which action can you take to address compliance?
In a security context, which action can you take to address compliance?A . Implement rules to prevent a vulnerability.B . Correct or counteract a vulnerability.C . Reduce the severity of a vulnerability.D . Follow directions from the security appliance manufacturer to remediate a vulnerability.View AnswerAnswer: A
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution After you...
What command should you run?
HOTSPOT You have a RADIUS server named RADIUS1. RADIUS1 is configured to use an IP address of 172.23.100.101. You add a wireless access point (wap) named WAP-Secure to your network. You configure WAP-Secure to use an IP address of 10.0.100.101. You need to ensure that WAP-Secure can authenticate to RADIUS1...
Which of the following configurations could be responsible for this outcome?
Your application uses PHP to accept and process file uploads. It fails to upload a file that is 5 MB in size, although upload_max_filesize is set to "10M". Which of the following configurations could be responsible for this outcome? (Choose 2)A . The PHP configuration option post_max_size is set to...