Does this meet the goal?

In this section, you will see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible...

August 15, 2018 No Comments READ MORE +

What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server3 that runs Windows Server 2012 R2 and has the DHCP Server role installed. DHCP is configured as shown in the exhibit. (Click the Exhibit button.) You need to ensure that only Scope1, Scope3, and...

August 15, 2018 No Comments READ MORE +

What should you run?

DRAG DROP You are a network administrator of an Active Directory domain named contoso.com. You have a server named Server1 that runs Windows Server 2012 R2. Server1 has the Web Server (IIS) server role installed. Server1 will host a web site at URL https://secure.contoso.com. The application pool identity account of...

August 15, 2018 No Comments READ MORE +

Which series of commands secures the router from the hackers?

Hackers are sending calls through a gateway router that is running SIP. The engineer blocks all SIP messages to the router except from their SIP server, which has an IP address of 208.177.10.1. The customer also must connect via SIP to their Cisco Expressway server with an IP address of...

August 15, 2018 No Comments READ MORE +

What is this 802.11 management frame also known as?

802.11k and 802.11k-enabled client devices send a request for a list of neighbor Aps (a neighbor list) from the APs they are currently associated with. What is this 802.11 management frame also known as?A . Association packetB . Beacon frameC . Action frameD . Reassociation response.View AnswerAnswer: C Explanation: From:...

August 15, 2018 No Comments READ MORE +

Which two statements are true about recommended practices that are to be used in a local VLAN solution design where layer 2 traffic is to be kept to a minimum? (Choose two)

Which two statements are true about recommended practices that are to be used in a local VLAN solution design where layer 2 traffic is to be kept to a minimum? (Choose two)A . Routing should occur at the access layer if voice VLANs is utilized. Otherwise, routing should occur at...

August 15, 2018 No Comments READ MORE +

On which column in the Employee table should you create a unique constraint?

You administer a Microsoft SQL Server 2012 database. The database contains a table named Employee. Part of the Employee table is shown in the exhibit. (Click the Exhibit button.) Confidential information about the employees is stored in a separate table named EmployeeData. One record exists within EmployeeData for each record...

August 15, 2018 No Comments READ MORE +

What should you include in the recommendation?

You need to recommend a solution for DHCP logging. The solution must meet the technical requirement. What should you include in the recommendation?A . Event subscriptionsB . IP Address Management (IPAM)C . DHCP audit loggingD . DHCP filteringView AnswerAnswer: B Explanation: * Scenario: A central log of the IP address...

August 14, 2018 No Comments READ MORE +

Which function does BFCP provide?

Which function does BFCP provide?A . BFCP is a secondary video channel that is used for content such as slide presentations and desktop sharing.B . BFCP is used to determine who is allowed to send media to the content channel.C . BFCP provides the ability to pan, tilt, and zoom the...

August 14, 2018 No Comments READ MORE +

What should you do on Server1?

Your network contains three servers named Server1, Server2, and Server3. All servers run Windows Server 2012 R2. You need to ensure that Server1 can provide iSCSI storage for Server2 and Server3. What should you do on Server1?A . Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties.B...

August 14, 2018 No Comments READ MORE +