If I have multiple Read Replicas for my master DB Instance and I promote one of them, what happens to the rest of the Read Replicas?

If I have multiple Read Replicas for my master DB Instance and I promote one of them, what happens to the rest of the Read Replicas?A . The remaining Read Replicas will still replicate from the older master DB InstanceB . The remaining Read Replicas will be deletedC . The remaining Read...

February 12, 2018 No Comments READ MORE +

What should you do?

You create a Nano server image named Nano1.vhdx by using the New-NanoServerImage cmdlet. You attach Nano1.vhdx to a Generation 1 virtual machine named Nano1. When you start Nano1, you get the following error message: “Boot failure. Reboot and select proper Boot device or Insert Boot Media in selected Boot device”...

February 12, 2018 No Comments READ MORE +

With Cisco ASA active/standby failover, by default, how many monitored interface failures will cause failover to occur?

With Cisco ASA active/standby failover, by default, how many monitored interface failures will cause failover to occur?A . 1B . 2C . 3D . 4E . 5View AnswerAnswer: A

February 11, 2018 No Comments READ MORE +

Within the vPC configuration of the 7K's the command peer-gateway is configured as confirmed with the command show vpc. what is the result of enabling this command?

Within the vPC configuration of the 7K's the command peer-gateway is configured as confirmed with the command show vpc. what is the result of enabling this command?A . Enable 7k-3 to act as the active gateway for packet received on VLAN 101 that are addressed to the MAC address of...

February 11, 2018 No Comments READ MORE +

Which technology should you recommend?

You are designing an Azure solution. The Solution must meet the following requirements: - Distribute traffic to different pools of dedicated virtual machines (VMs) based on rules. - Provide SSL offloading capabilities. You need to recommend a solution to distribute network traffic. Which technology should you recommend?A . Azure Traffic...

February 11, 2018 No Comments READ MORE +

Which of the below mentioned options is the right instance type and costing model in this case if the user performs the same task for the whole year?

A user is running a batch process which runs for 1 hour every day. Which of the below mentioned options is the right instance type and costing model in this case if the user performs the same task for the whole year?A .  EBS backed instance with on-demand instance pricing.B .  EBS...

February 11, 2018 No Comments READ MORE +

Which option should be chosen to meet this requirement?

During an upgrade, the ESXi 6.x installer finds an existing version of ESXi and a VMFS3 volume. No virtual machines exist on the host or VMFS3 volume. The requirement is to upgrade to VMFS5. Which option should be chosen to meet this requirement?A . Upgrade ESXi and preserve the VMFS...

February 11, 2018 No Comments READ MORE +

An engineer wants to configure WebEx to adjust the precedence and override the QoS profile on the WLAN. Which configuration is needed to complete this task?

An engineer wants to configure WebEx to adjust the precedence and override the QoS profile on the WLAN. Which configuration is needed to complete this task?A . Change the AVC application WebEx-app-sharing to markB . Create an ACL for WebEx.C . Change the WLAN reserved bandwidth for WebEx.D . Create...

February 11, 2018 No Comments READ MORE +

How should you complete the relevant Windows PowerShell commands?

HOTSPOT Contoso, Ltd., has an Office 365 tenant. All employees have Exchange Online mailboxes. You create a shared mailbox named [email protected]. You need to grant full mailbox access to [email protected] for the SharedMailbox1 mailbox. How should you complete the relevant Windows PowerShell commands? To answer, select the appropriate Windows PowerShell...

February 11, 2018 No Comments READ MORE +

Which of the following attacks exploits web age vulnerabilities that allow an attacker to force an unsuspecting user’s browser to send malicious requests they did not intend?

Which of the following attacks exploits web age vulnerabilities that allow an attacker to force an unsuspecting user’s browser to send malicious requests they did not intend?A . Command Injection AttacksB . File Injection AttackC . Cross-Site Request Forgery (CSRF)D . Hidden Field Manipulation AttackView AnswerAnswer: C

February 11, 2018 No Comments READ MORE +