A network engineer requires that an OSPF ASBR must only flood external LSAs only within its own area. What OSPF area type should be configured?
A network engineer requires that an OSPF ASBR must only flood external LSAs only within its own area. What OSPF area type should be configured?A . Backbone AreaB . Totally Stub AreaC . Not So Stubby AreaD . Stub AreaView AnswerAnswer: C
Which two functions of the technology specialists in a Cisco Business Architecture engagement are true? (Choose two
Which two functions of the technology specialists in a Cisco Business Architecture engagement are true? (Choose twoA . Define business capabilities.B . Support the engagement that is led by the business architectC . Identify customer business prioritiesD . Own the customer relationshipE . Focus on specific technical solutionsView AnswerAnswer: AC...
Is it possible to access your EBS snapshots?
Is it possible to access your EBS snapshots?A . Yes, through the Amazon 53 APIs.B . Yes, through the Amazon EC2 APIs.C . No, EBS snapshots cannot be accessed; they can only be used to create a new EBS volume.D . EBS doesn't provide snapshots.View AnswerAnswer: B
How many types of block devices does Amazon EC2 support?
How many types of block devices does Amazon EC2 support?A . 4B . 5C . 2D . 1View AnswerAnswer: C Explanation: Amazon EC2 supports 2 types of block devices. Reference: http://docs.amazonwebservices.com/AWSEC2/latest/UserGuide/block-device-mapping-concepts.html
On which two OSI layers does the IEEE focus in 802 standardization? (Choose two.)
On which two OSI layers does the IEEE focus in 802 standardization? (Choose two.)A . physicalB . data-linkC . networkD . transportE . sessionF . presentationG . applicationView AnswerAnswer: A, B
Which container type is described below:
Which container type is described below: Provides application isolation through process and namespace isolation technology. This container shares a kernel with the container host and all containers running on the host.A . Hyper-V ContainerB . Windows Server ContainerView AnswerAnswer: B
Which of the following command line tools can be used to Activate Windows Server?
You have just finished installing Windows Server 2016 on a new server. Your colleague has informed you that its essential that you must activate Windows Server. Which of the following command line tools can be used to Activate Windows Server?A . Netdom C:windowssystem32slmgr.vbs -atoB . Netsh C:windowssystem32slmgr.vbs -atoC . Ocsetup...
Which two characteristics of an application layer firewall are true? (Choose two)
Which two characteristics of an application layer firewall are true? (Choose two)A . provides protection for multiple applicationsB . is immune to URL manipulationC . provides reverse proxy servicesD . provides stateful firewall functionalityE . has low processor usageView AnswerAnswer: AC
Which of the following describes what this code has done on the network?
A cybersecurity analyst has received the laptop of a user who recently left the company. The analyst types ‘history’ into the prompt, and sees this line of code in the latest bash history: This concerns the analyst because this subnet should not be known to users within the company. Which...
Which solution should you recommend?
You need to recommend an appropriate solution for the data mining requirements. Which solution should you recommend?A . Design a schedule process that allocates tasks to multiple virtual machines, and use the Azure Portal to create new VMs as needed.B . Use Azure Batch to schedule jobs and automate scaling...