Which statements about IP-based explicit proxy authentication are true? (Choose two.)

Which statements about IP-based explicit proxy authentication are true? (Choose two.)A . IP-based authentication is best suited to authenticating users behind a NAT device.B . Sessions from the same source address are treated as a single user.C . IP-based authentication consumes less FortiGate’s memory than session-based authentication.D . FortiGate remembers...

August 11, 2018 No Comments READ MORE +

Which of the following solutions should the technician install to meet these requirements?

A network technician is building a network for a small office. The office currently has cable TV and now requires access to the Internet without adding any cabling other than what is already in place. Which of the following solutions should the technician install to meet these requirements?A . DOCSIS...

August 11, 2018 No Comments READ MORE +

Regarding the description of RRC establishment success rate, which of the following options is wrong?

Regarding the description of RRC establishment success rate, which of the following options is wrong?A . Reflecting the UE's admission capability of the eNB or the cellB . The successful establishment of the RRC connection means that the UE establishes a signaling connection with the network.C . RRC connection establishment...

August 11, 2018 No Comments READ MORE +

You are working with an organization that uses Microsoft Dynamics 365 and Microsoft Office 365. The organization communicates with their customers primarily via email.

You are working with an organization that uses Microsoft Dynamics 365 and Microsoft Office 365. The organization communicates with their customers primarily via email. The organization is struggling with getting emails tracked in Dynamics 365 on the right records, and emails are often not tracked at all. Which feature should...

August 11, 2018 No Comments READ MORE +

Which Windows PowerShell cmdlet should you run?

A company uses Skype for Business Online. You use contoso.com as the verified domain name for the Office 365 tenant. Users conduct Skype online meetings. You add fabricam.com to the tenant and configure the tenant to use this domain name. You need to ensure that all Skype online meeting URLs...

August 11, 2018 No Comments READ MORE +

Which tool should you use?

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question...

August 11, 2018 No Comments READ MORE +

Which two protocols are used in the traversing of media across a firewall through the Expressway? (Choose two.)

Which two protocols are used in the traversing of media across a firewall through the Expressway? (Choose two.)A . AssentC . 460.18/19D . SIPF . 239H . 323View AnswerAnswer: AB

August 11, 2018 No Comments READ MORE +

Which statement indicates something that can cause an inbound PSTN call to an H.323 gateway that is configured in Cisco Unified Communications Manager to fail to ring an IP phone?

Which statement indicates something that can cause an inbound PSTN call to an H.323 gateway that is configured in Cisco Unified Communications Manager to fail to ring an IP phone?A .  The gateway is not registered in Cisco Unified Communications Manager.B .  The gateway IP address that is configured in...

August 11, 2018 No Comments READ MORE +

In which three ways should the design of the STP domain be optimized for server and application performance?

Refer to the exhibit. Your company designed a network to allow server VLANs in a data center to span all access switches. In the design, Layer 3 VLAN interfaces and HSRP are configured on the aggregation switches. In which three ways should the design of the STP domain be optimized...

August 11, 2018 No Comments READ MORE +

Which network device does NTP authenticate?

Which network device does NTP authenticate?A . Only the time sourceB . Only the client deviceC . The firewall and the client deviceD . The client device and the time sourceView AnswerAnswer: A

August 11, 2018 No Comments READ MORE +