What should you identify?
Your network contains a perimeter network and an internal network. The internal network contains an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as the attribute store. You plan to deploy a federation server proxy to a server named Server2 in the perimeter network. You...
When your wireless client device roams from one AP to another on the same network, which IEEE protocol can be used to authenticate the clients faster?
When your wireless client device roams from one AP to another on the same network, which IEEE protocol can be used to authenticate the clients faster?A . 802.11r also called Assisted RoamingB . 802.11k also called Assisted RoamingC . 802.11r also called Fast BSS TransitionD . 802.11k also called Predictive...
Which two products are considered a part of the Cisco Meraki full stack? (Choose two.)
Which two products are considered a part of the Cisco Meraki full stack? (Choose two.)A . Aironet wireless access pointsB . Catalyst switchesC . MR wireless access pointsD . UCS serversE . MX security appliancesView AnswerAnswer: CE Explanation: https://meraki.cisco.com/blog/tag/fullstack/
Which component should you identify?
Topic 2, Plan desktop and device deployment You administer a Windows 10 Enterprise computer that runs Hyper-V. The computer hosts a virtual machine with multiple snapshots. The virtual machine uses one virtual CPU and 512 MB of RAM. You discover that the virtual machine pauses automatically and displays the state...
You are evaluating access points for use in the 5GHz frequency band. What PHY supports this band and supports 80 MHz channels?
You are evaluating access points for use in the 5GHz frequency band. What PHY supports this band and supports 80 MHz channels?A . OFDMB . HTC . VHTD . ERPView AnswerAnswer: C
Which four actions should you recommend be performed in sequence?
DRAG DROP A company runs multiple line-of-business applications in a Kubernetes container cluster. Source code for the applications resides in a version control repository which is a part of a continuous integration/continuous deployment (CI/CD) solution. You must be able to upgrade containerized applications without downtime after all tests and reviews...
What is the maximum number of Cisco Unified Communications Manager subscriber pairs in a megacluster deployment?
What is the maximum number of Cisco Unified Communications Manager subscriber pairs in a megacluster deployment?A . 4B . 8C . 12D . 16E . 32View AnswerAnswer: B Explanation: There can be up to 8 pairs of subscribers, 16 subscribers total and must be in a 1:1 redundancy mode (8...
Which Transact-SQL batch should you use?
You administer a Microsoft SQL Server 2016 database that contains a table named OrderDetail. You discover that the NCI_OrderDetail_CustomerID non-clustered index is fragmented. You need to reduce fragmentation. You need to achieve this goal without taking the index offline. Which Transact-SQL batch should you use?A . CREATE INDEX NCI_OrderDetail_CustomerID ON...
What should you do on Server2?
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server role installed. An administrator installs the IP Address Management (IPAM) Server feature on a server named Server2. The administrator configures IPAM by using...
Which statement below is correct in describing the protection of AWS resources in each subnet?
You have been setting up an Amazon Virtual Private Cloud (Amazon VPC) for your company, including setting up subnets. Security is a concern, and you are not sure which is the best security practice for securing subnets in your VPC. Which statement below is correct in describing the protection of AWS resources in each...