What should you do?

You support Windows 10 Enterprise computers. Your company has started testing Application Virtualization (App-V) applications on several laptops. You discover that the App-V applications are available to users even when the laptops are offline. You need to ensure that the App-V applications are available to users only when they are...

August 11, 2018 No Comments READ MORE +

What happens to the status of users already logged into ESXi Shell when a vSphere administrator enables lockdown mode?

What happens to the status of users already logged into ESXi Shell when a vSphere administrator enables lockdown mode?A . Users remain logged in and can run commands, except to disable lockdown mode.B . Users remain logged in and can run commands, including disabling lockdown mode.C . Users are immediately...

August 11, 2018 No Comments READ MORE +

Which of the following ACL rules should be configured in the firewall’s WAN port?

A network technician is configuring a firewall access list to secure incoming connections to an email server. The internal address of this email server is 192.168.1.143. The firewall should allow external email servers to send email to the email server. The email server also supports client access via a web...

August 11, 2018 No Comments READ MORE +

Which option allows one voicemail box to serve both directory numbers?

A user is assigned more than one directory number. Which option allows one voicemail box to serve both directory numbers?A . Alternate ExtensionB . Notification DevicesC . Alternate NamesD . Message SettingsE . Caller InputF . MailboxView AnswerAnswer: A

August 11, 2018 No Comments READ MORE +

How would you redesign the network VPN headend devices to prevent this from happening again in the future?

A network administrator is in charge of multiple IPsec VPN headend devices that service thousands of remote connectivity, point-to-point, IPsec/GRE tunnels. During a recent power outage, in which it was found that a backup power supply in one of those headend devices was faulty, one of the headend routers suffered...

August 11, 2018 No Comments READ MORE +

Does this meet the goal?

In this section, you will see one or more sets of questions with the same scenario and problem. Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible...

August 11, 2018 No Comments READ MORE +

How would you implement the architecture on AWS in order to maximize scalability and high availability?

You are migrating a legacy client-server application to AWS. The application responds to a specific DNS domain (e.g. www.example.com) and has a 2-tier architecture, with multiple application servers and a database server. Remote clients use TCP to connect to the application servers. The application servers need to know the IP address of the clients in...

August 11, 2018 No Comments READ MORE +

Which statements about IP-based explicit proxy authentication are true? (Choose two.)

Which statements about IP-based explicit proxy authentication are true? (Choose two.)A . IP-based authentication is best suited to authenticating users behind a NAT device.B . Sessions from the same source address are treated as a single user.C . IP-based authentication consumes less FortiGate’s memory than session-based authentication.D . FortiGate remembers...

August 11, 2018 No Comments READ MORE +

Which of the following solutions should the technician install to meet these requirements?

A network technician is building a network for a small office. The office currently has cable TV and now requires access to the Internet without adding any cabling other than what is already in place. Which of the following solutions should the technician install to meet these requirements?A . DOCSIS...

August 11, 2018 No Comments READ MORE +