What should you run on Server1?
You have a server named Server1. You enable BitLocker Drive Encryption (BitLocker) on Server1. You need to change the password for the Trusted Platform Module (TPM) chip. What should you run on Server1?A . Initialize-TpmB . Import-TpmOwnerAuthC . repair-bde.exeD . bdehdcfg-exeView AnswerAnswer: B
Which virtual machine settings should you configure?
Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contain several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which...
Which tag should you use?
You are modifying a blog site to improve search engine readability. You need to group relevant page content together to maximize search engine readability. Which tag should you use?A . <article>B . <table>C . <div>D . <span>View AnswerAnswer: A Explanation: The <article> tag specifies independent, self-contained content. An article should...
A private wan connection is suspected of intermittently corrupting data. Which technology can a network administrator use to detect and drop the altered data traffic?
A private wan connection is suspected of intermittently corrupting data. Which technology can a network administrator use to detect and drop the altered data traffic?A . AES-128B . RSA CertificatesC . SHA2-HMACD . 3DESE . Diffie-Helman Key GenerationView AnswerAnswer: C
Which DNS record should you create?
HOTSPOT You deploy an Azure Web App named ContosoApp. You configure a Traffic Manager profile for ContosoApp. You need to create the required DNS record to redirect queries to ContosoApp from the Internet. The solution must ensure that remote users can connect to ContosoApp by using the https://webservice.contoso.com URL. Which...
What happens when computers on a private network attempt to connect to the Internet through a Cisco router running PAT?
What happens when computers on a private network attempt to connect to the Internet through a Cisco router running PAT?A . The router uses the same IP address but a different TCP source port number for each connection.B . An IP address is assigned based on the priority of the...
A user behind the FortiGate is trying to go to http://www.addictinggames.com (Addicting.Games). Based on this configuration, which statement is true?
View the exhibit. A user behind the FortiGate is trying to go to http://www.addictinggames.com (Addicting.Games). Based on this configuration, which statement is true?A . Addicting.Games is allowed based on the Application Overrides configuration.B . Addicting.Games is blocked based on the Filter Overrides configuration.C . Addicting.Games can be allowed only if...
What should you do?
You manage an application running on Azure Web Sites Standard tier. The application uses a substantial amount of large image files and is used by people around the world. Users from Europe report that the load time of the site is slow. You need to implement a solution by using...
What should you do?
You need to ensure that RESEARCH1 only contains the required virtual machines. What should you do?A . Create an availability set.B . Create a custom placement rule.C . Set RESEARCH1 as a possible owner.D . Set RESEARCH1 as a preferred owner.View AnswerAnswer: B
What should you do when you import the template?
Your network contains an Active Directory domain named contoso.com. The domain contains a Microsoft System Center 2012 infrastructure. You deploy a second System Center 2012 infrastructure in a test environment. You create a service template named Template1 in both System Center 2012 infrastructures. For self-service users, you create a service...