- All Exams Instant Download
Which configuration tool should be used to allow the One Button to Push feature to work?
A user wants to use the One Button to Push feature on a Cisco TelePresence System 500-32 video endpoint. Which configuration tool should be used to allow the One Button to Push feature to work?A . Cisco Unified Communications Manager server, phones, devices, One Button to PushB . Cisco Gigaswitch...
Which of the below mentioned options is recommended by AWS with respect to the selection of the availability zone?
A user is launching an EC2 instance in the US East region. Which of the below mentioned options is recommended by AWS with respect to the selection of the availability zone?A . Always select the AZ while launching an instanceB . Always select the US-East-1-a zone for HAC . Do not...
Which of the following key combinations he can use to recover the IMEI number?
Ron. a computer forensics expert, Is Investigating a case involving corporate espionage. He has recovered several mobile computing devices from the crime scene. One of the evidence that Ron possesses is a mobile phone from Nokia that was left in on condition. Ron needs to recover the IMEI number of...
Would you recommend?
Your customers are seeking desktop telephones for their administrative staff. They are interested in supporting rich audio and video collaboration features. Would you recommend?A . 9641B . H175C . E159D . 9621View AnswerAnswer: B
Which destination port or ports should you open?
You are the Office 365 administrator for a company. You plan to use Skype for Business Online on all mobile devices. Employees currently use the following device types: Some users report that they do not receive push notifications. Skype for Business Online must be able to send push notifications to...
What are two reasons why a route might be hidden? (Choose two.)
What are two reasons why a route might be hidden? (Choose two.)A . route preferenceB . routing loopC . invalid next hopD . routing policyView AnswerAnswer: C, D
What does the following command do with respect to the Amazon EC2 security groups?
What does the following command do with respect to the Amazon EC2 security groups? ec2-revoke RevokeSecurityGroup IngressA . Removes one or more security groups from a rule.B . Removes one or more security groups from an Amazon EC2 instance.C . Removes one or more rules from a security group.D ....
What should you do?
You manage an Azure subscription with virtual machines (VMs) that are running in Standard mode. You need to reduce the storage costs associated with the VMs. What should you do?A . Locate and remove orphaned disks.B . Add the VMs to an affinity group.C . Change VMs to the Basic...
Which three authentication methods does VRRP use? (Choose three.)
Which three authentication methods does VRRP use? (Choose three.)A . 802.1x authenticationB . Cipher authenticationC . SHA-256 authenticationD . No authenticationE . Plain text authenticationF . MD5 authenticationView AnswerAnswer: DEF
What should you do?
You are developing a web application that connects to an existing virtual network. The web application needs to access a database that runs on a virtual machine. In the Azure portal, you use the virtual network integration user interface to select from a list of virtual networks. The virtual network...