For optimized encrypted MAPI, is the inner channel encrypted by default?

For optimized encrypted MAPI, is the inner channel encrypted by default?A . Yes, alwaysB . NoC . Only for MS Exchange 2003 and laterD . Yes, but this is configured on the serverView AnswerAnswer: B Explanation: Reference: https://support.riverbed.com/bin/support/static/d6j3tb1i55ni1erbjp6e3fln9v/html/mhmppa9t9gq3laicvt0r91b1n7/sh_cx_9.2_ug_html/index.html#page/sh_cx_9.2_ug/setupServiceProtocolsMAPI.html

May 27, 2021 No Comments READ MORE +

Which SteelHead appliance deployment mode uses the Primary interface for optimization?

Which SteelHead appliance deployment mode uses the Primary interface for optimization?A . Virtual in-pathB . Physical in-pathC . Serial ClusterD . Server-Side Out of Path (SSOOP)E . InterceptorView AnswerAnswer: E

May 26, 2021 No Comments READ MORE +

Which statement is true about NFS optimization?

Which statement is true about NFS optimization?A . NFS cannot be optimized due to its proprietary encryption mechanismB . All NFS is optimized with both bandwidth and latencyC . NFS v2 & v4 can be optimized with bandwidth only, v3 can attain both bandwidth & latencyD . NFS can only...

May 26, 2021 No Comments READ MORE +

What is the benefit of configuring Datastore Sync between SteelHeads?

What is the benefit of configuring Datastore Sync between SteelHeads?A . It allows up to four SteelHeads in a cluster access to the same datastoreB . It gives high availability to the warm data patterns in exactly two SteelHeadsC . It allows for seamless transition when upgrading to a larger...

May 26, 2021 No Comments READ MORE +

What is the purpose of creating an account in Active Directory with Replication User privilege for the use of the SteelHeads?

What is the purpose of creating an account in Active Directory with Replication User privilege for the use of the SteelHeads?A . It allows SteelHeads to authenticate users on behalf of the Domain ControllersB . It allows SteelHeads the ability to automatically run backups to a SMB file share within...

May 25, 2021 No Comments READ MORE +

In which type of computing does the cloud provider provide users with the platform and environment to develop, manage, and run applications over the Internet?

In which type of computing does the cloud provider provide users with the platform and environment to develop, manage, and run applications over the Internet?A . IaaSB . PaaSC . SaaSD . YaaSView AnswerAnswer: C Explanation: Reference: https://rubygarage.org/blog/iaas-vs-paas-vs-saas

May 25, 2021 No Comments READ MORE +

In which of the following Transparency Modes do the Client and Server retain their own IP addressing across the WAN?

In which of the following Transparency Modes do the Client and Server retain their own IP addressing across the WAN?A . Correct AddressingB . Port TransparencyC . Full TransparencyD . All of the aboveView AnswerAnswer: C Explanation: Reference: https://support.riverbed.com/bin/support/static/17qudtqont75l258qrbn4maj75/html/1mk0rjev5snblam40lgbg0mrgp/sh_9.5_dg_html/index.html#page/sh_9.5_dg/network_trans.html

May 25, 2021 No Comments READ MORE +

Which report displays the rate of established SSL connections?

Which report displays the rate of established SSL connections?A . WAN ThroughputB . Traffic SummaryC . SSLD . Current ConnectionsView AnswerAnswer: C Explanation: Reference: https://support.riverbed.com/bin/support/static/d6j3tb1i55ni1erbjp6e3fln9v/html/mhmppa9t9gq3laicvt0r91b1n7/sh_cx_9.2_ug_html/index.html#page/sh_cx_9.2_ug/reportSSLStatistics.html

May 24, 2021 No Comments READ MORE +

In a Quad Interceptor deployment with two paths, what are the correct settings to configure for High Availability?

In a Quad Interceptor deployment with two paths, what are the correct settings to configure for High Availability?A . Fail-to-wire and allow neighbour failureB . Fail-to-wire and do not allow neighbour failureC . Fail-to-block and allow neighbour failureD . Fail-to-block and do not allow neighbour failureView AnswerAnswer: B

May 23, 2021 No Comments READ MORE +

In virtual in-path deployments, such as PBR, what is never used?

In virtual in-path deployments, such as PBR, what is never used?A . Subnet-side rulesB . A fake SNMP if-indexC . LAN interfaceD . WAN interfaceView AnswerAnswer: B Explanation: Reference: https://support.riverbed.com/bin/support/static/fbunsuuo632vi3jrspe0evbko9/html/u2pi6l52l4drmhq3uhck9tu7hm/sh_9.2_dg_html/index.html#page/sh_9.2_dg/logical_inpath.html

May 21, 2021 No Comments READ MORE +