What should you recommend?

You are evaluating a Windows Azure application. The application uses one instance of a web role. The role instance size is set to Medium. The application does not use SQL Azure. You have the following requirements for scaling the application: • Maximize throughput. • Minimize downtime while scaling. • Increase...

August 12, 2018 No Comments READ MORE +

What is a the best way to secure the route processor on a Cisco device?

What is a the best way to secure the route processor on a Cisco device?A . Route processor traffic controlB . Control plane quality of serviceC . Control plane policingD . Access listsView AnswerAnswer: C

August 12, 2018 No Comments READ MORE +

Solution: You install Windows Server 2012 R2 on a new server, and then you run the Windows Server Migration Tools. Does this meet the goal?

Your network contains 50 servers that run Windows Server 2003 and 50 servers that run Windows Server 2008. You plan to implement Windows Server 2012 R2. You need to create a report that includes the following information: • The servers that run applications and services that can be moved to...

August 12, 2018 No Comments READ MORE +

What is wrong with the policy-map configuration?

Refer to the Cisco IOS XR policy-map configuration exhibit. What is wrong with the policy-map configuration?A . missing the priority percent command under class one and class twoB . missing the police command under class one and class twoC . missing the police command under class threeD . missing the...

August 12, 2018 No Comments READ MORE +

Which permission type should you use for each app?

DRAG DROP You plan to integrate Azure Active Directory (Azure AD) with the following custom applications: You need to configure the web API permissions for the apps. Which permission type should you use for each app? View AnswerAnswer: Explanation:

August 12, 2018 No Comments READ MORE +

Which three statements are correct regarding ping mpls command operations? (Choose three.)

Which three statements are correct regarding ping mpls command operations? (Choose three.)A . MPLS OAM has to be enabled on the router using the mpls oam command.B . They use a 127/8 address as the destination address in the MPLS echo request packet.C . They use ICMP echo request and...

August 12, 2018 No Comments READ MORE +

Which step library is included in the license for Cisco Unified Contact Center Express Standard?

Which step library is included in the license for Cisco Unified Contact Center Express Standard?A . document stepsB . email stepsC . ICM stepsD . database stepsView AnswerAnswer: A

August 12, 2018 No Comments READ MORE +

Which Layer 2 VPN technology is implemented over an IP core network without the need for MPLS?

Which Layer 2 VPN technology is implemented over an IP core network without the need for MPLS?A . VPLSB . VPWSC . AToMD . L2TPv3View AnswerAnswer: D

August 12, 2018 No Comments READ MORE +

Does this meet the goal?

You need to ensure that the developers can manage their own virtual machines. Solution: You perform the following tasks: • In Virtual Machine Manager, you create a new user role named DevUsers that uses the Application Administrator profile, • You add the virtual machines to the DevUsers role. • You...

August 12, 2018 No Comments READ MORE +

Which actions should you perform on the virtual machines?

DRAG DROP You have a Hyper-V host named Host1.Host1 contains two virtual machines named VM1 and VM2.VM1 is configured as a print server.VM1 runs Windows Server 2008 R2.VM2 is configured as a file server.VM2 runs Windows Server 2012 R2. You need to migrate all of the printers on VM1 to...

August 12, 2018 No Comments READ MORE +