A network engineer requires that an OSPF ASBR must only flood external LSAs only within its own area. What OSPF area type should be configured?

A network engineer requires that an OSPF ASBR must only flood external LSAs only within its own area. What OSPF area type should be configured?A . Backbone AreaB . Totally Stub AreaC . Not So Stubby AreaD . Stub AreaView AnswerAnswer: C

February 10, 2018 No Comments READ MORE +

Which two functions of the technology specialists in a Cisco Business Architecture engagement are true? (Choose two

Which two functions of the technology specialists in a Cisco Business Architecture engagement are true? (Choose twoA . Define business capabilities.B . Support the engagement that is led by the business architectC . Identify customer business prioritiesD . Own the customer relationshipE . Focus on specific technical solutionsView AnswerAnswer: AC...

February 10, 2018 No Comments READ MORE +

Is it possible to access your EBS snapshots?

Is it possible to access your EBS snapshots?A . Yes, through the Amazon 53 APIs.B . Yes, through the Amazon EC2 APIs.C . No, EBS snapshots cannot be accessed; they can only be used to create a new EBS volume.D . EBS doesn't provide snapshots.View AnswerAnswer: B

February 10, 2018 No Comments READ MORE +

How many types of block devices does Amazon EC2 support?

How many types of block devices does Amazon EC2 support?A .  4B .  5C .  2D .  1View AnswerAnswer: C Explanation: Amazon EC2 supports 2 types of block devices. Reference: http://docs.amazonwebservices.com/AWSEC2/latest/UserGuide/block-device-mapping-concepts.html

February 10, 2018 No Comments READ MORE +

On which two OSI layers does the IEEE focus in 802 standardization? (Choose two.)

On which two OSI layers does the IEEE focus in 802 standardization? (Choose two.)A . physicalB . data-linkC . networkD . transportE . sessionF . presentationG . applicationView AnswerAnswer: A, B

February 10, 2018 No Comments READ MORE +

Which container type is described below:

Which container type is described below: Provides application isolation through process and namespace isolation technology. This container shares a kernel with the container host and all containers running on the host.A . Hyper-V ContainerB . Windows Server ContainerView AnswerAnswer: B

February 10, 2018 No Comments READ MORE +

Which of the following command line tools can be used to Activate Windows Server?

You have just finished installing Windows Server 2016 on a new server. Your colleague has informed you that its essential that you must activate Windows Server. Which of the following command line tools can be used to Activate Windows Server?A . Netdom C:windowssystem32slmgr.vbs -atoB . Netsh C:windowssystem32slmgr.vbs -atoC . Ocsetup...

February 10, 2018 No Comments READ MORE +

Which two characteristics of an application layer firewall are true? (Choose two)

Which two characteristics of an application layer firewall are true? (Choose two)A . provides protection for multiple applicationsB . is immune to URL manipulationC . provides reverse proxy servicesD . provides stateful firewall functionalityE . has low processor usageView AnswerAnswer: AC

February 9, 2018 No Comments READ MORE +

Which of the following describes what this code has done on the network?

A cybersecurity analyst has received the laptop of a user who recently left the company. The analyst types ‘history’ into the prompt, and sees this line of code in the latest bash history: This concerns the analyst because this subnet should not be known to users within the company. Which...

February 9, 2018 No Comments READ MORE +

Which solution should you recommend?

You need to recommend an appropriate solution for the data mining requirements. Which solution should you recommend?A . Design a schedule process that allocates tasks to multiple virtual machines, and use the Azure Portal to create new VMs as needed.B . Use Azure Batch to schedule jobs and automate scaling...

February 9, 2018 No Comments READ MORE +