Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?
Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?A . monitor session 2 source interface gigabitethernet0/3 tx monitor session 2 filter vlan 3B . monitor session 2 source interface gigabitethernet0/3 tx monitor session 2...
Where is a tower server commonly deployed, and why?
Where is a tower server commonly deployed, and why?A . Branch or remote location, because a rack is not neededB . Datacenter, because tower servers tend to be more powerful so more work can be done in the same physical spaceC . Branch or remote location, because of security concernsD...
Which solution will meet these requirements?
A company has an on-premises application that is written in Go. A DevOps engineer must move the application to AWS. The company's development team wants to enable blue/green deployments and perform A/B testing. Which solution will meet these requirements?A . Deploy the application on an Amazon EC2 instance, and create...
What is a characteristic of loading data into Snowflake using the Snowflake Connector for Kafka?
What is a characteristic of loading data into Snowflake using the Snowflake Connector for Kafka?A . The Connector only works in Snowflake regions that use AWS infrastructure.B . The Connector works with all file formats, including text, JSON, Avro, Ore, Parquet, and XML.C . The Connector creates and manages its...
What are the MINIMUM grants required on the database, schema, and table for a stream to be properly created and managed?
What are the MINIMUM grants required on the database, schema, and table for a stream to be properly created and managed?A . Database: Usage Schema: Usage Table: Select, Create StreamB . Database: Usage Schema: Usage Table: SelectC . Database: Usage, Create Stream Schema: Usage Table: SelectD . Database: Usage Schema:...
What are some features of a unique secondary key? Note: There are 2 correct answers to this question.
What are some features of a unique secondary key? Note: There are 2 correct answers to this question.A . It is created when a table is filled.B . It is updated when the modified table is read again.C . It is created with the first read access of a table.D...
What should you do?
You have a Microsoft Exchange Online tenant named contoso.com. You create a partnership with two other companies named fabhkam.com and wingtiptoys.com. All the mailboxes of fabnkam.com are hosted in Microsoft 365. All the mailboxes of wingtiptoys.com are hosted in an on-premises Exchange Server 2019 organization. You need to ensure that...
Which solution will meet these requirements?
A company provides an application to customers. The application has an Amazon API Gateway REST API that invokes an AWS Lambda function. On initialization, the Lambda function loads a large amount of data from an Amazon DynamoDB table. The data load process results in long cold-start times of 8-10 seconds....
Which settings are needed on the content object record? Note: There are 2 correct answers to this question.
Which settings are needed on the content object record? Note: There are 2 correct answers to this question.A . Developer toolB . FilenameC . Launch methodD . Content PlayerView AnswerAnswer: B, C
When activating Hardware Asset Management (HAM) in an instance already running Field Service Management (FSM), how do you configure asset tasks for existing incident, change, and work order flows?
When activating Hardware Asset Management (HAM) in an instance already running Field Service Management (FSM), how do you configure asset tasks for existing incident, change, and work order flows?A . No configuration is required: asset tasks automatically activate behind the scenesB . Activate HAM, then run scheduled job "Asset -...