Which two of these changes are necessary for SwitchA to meet the requirements?

Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface...

August 20, 2018 No Comments READ MORE +

If there is an Accept Implied Policy set to “First”, what is the reason Jorge cannot see any logs?

If there is an Accept Implied Policy set to “First”, what is the reason Jorge cannot see any logs?A . Log Implied Rule was not selected on Global Properties.B . Log Implied Rule was not set correctly on the track column on the rules base.C . Track log column is...

August 20, 2018 No Comments READ MORE +

Which two steps are associated with the active portion of the audit when a post-installation audit is performed with an auditing tool such as Ekahau? (Choose two.)

Which two steps are associated with the active portion of the audit when a post-installation audit is performed with an auditing tool such as Ekahau? (Choose two.)A . Check for co-channel interference by standing near an access point on one channel and watching for other access points that are on...

August 20, 2018 No Comments READ MORE +

You have a shared folder named Share1

HOTSPOT You have a shared folder named Share1. The folder permissions of Share1 are configured as shown in the Folder Permissions exhibit. (Click the Exhibit button.) The Share permissions of Share1 are configured as shown in the Share Permissions exhibit. (Click the Exhibit button.) You have a group named Group1....

August 20, 2018 No Comments READ MORE +

Which three statements are true about terms in a policy? (Choose three.)

Which three statements are true about terms in a policy? (Choose three.)A . The order of the terms in a policy is irrelevant.B . The action is specified in a then statement.C . Terms are optional in a policy.D . The match condition can be identified with a from statement.E...

August 20, 2018 No Comments READ MORE +

A network is configured to allow clientless access to resources inside the network. Which feature must be enabled and configured to allow SSH applications to respond on the specified port 8889?

A network is configured to allow clientless access to resources inside the network. Which feature must be enabled and configured to allow SSH applications to respond on the specified port 8889?A . auto applet downloadB . port forwardingC . web-type ACLD . HTTP proxyView AnswerAnswer: B

August 20, 2018 No Comments READ MORE +

Which two service categories should you configure on the service settings page of the Office 365 admin portal?

HOTSPOT Your company uses Office 365 Small Business. You need to configure the Microsoft Exchange ActiveSync password policy and control the display of presence information. Which two service categories should you configure on the service settings page of the Office 365 admin portal? To answer, select the appropriate service categories...

August 20, 2018 No Comments READ MORE +

Which four actions you perform in sequence?

http://www.fabrikam.com will be load balanced across Pool22. - ER1 must route traffic between the New York office and the platform as a service (PaaS) services in the East US Azure region, as long as ER1 is available. - ER2 must route traffic between the Los Angeles office and the PaaS...

August 20, 2018 No Comments READ MORE +

Which backup architecture will meet these requirements?

Your customer wishes to deploy an enterprise application to AWS which will consist of several web servers, several application servers and a small (50GB) Oracle database information is stored, both in the database and the file systems of the various servers. The backup system must support database recovery whole server and whole disk restores,...

August 20, 2018 No Comments READ MORE +

Your company has a testing environment that contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016. Server1 has IP Address Management (IPAM) installed. IPAM has the following configuration

HOTSPOT Your company has a testing environment that contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2016. Server1 has IP Address Management (IPAM) installed. IPAM has the following configuration. The IPAM Overview page from Server Manager is shown in the...

August 20, 2018 No Comments READ MORE +