Which configuration should you use?

You are implementing a SQL Server 2016 five-node failover cluster. You need to choose a quorum configuration. Which configuration should you use?A . Distributed File System (DFS)B . Node MajorityC . Cluster Shared Volume (CSV)D . Node and Disk MajorityView AnswerAnswer: D Explanation: Node and Disk Majority (recommended for clusters...

January 12, 2018 No Comments READ MORE +

How to verify that TACACS+ connectivity to a device?

How to verify that TACACS+ connectivity to a device?A . You successfully log in to the device by using the local credentials.B . You connect to the device using SSH and receive the login prompt.C . You successfully log in to the device by using ACS credentials.D . You connect...

January 12, 2018 No Comments READ MORE +

Which configuration tool should be used to allow the One Button to Push feature to work?

A user wants to use the One Button to Push feature on a Cisco TelePresence System 500-32 video endpoint. Which configuration tool should be used to allow the One Button to Push feature to work?A . Cisco Unified Communications Manager server, phones, devices, One Button to PushB . Cisco Gigaswitch...

January 12, 2018 No Comments READ MORE +

Which of the below mentioned options is recommended by AWS with respect to the selection of the availability zone?

A user is launching an EC2 instance in the US East region. Which of the below mentioned options is recommended by AWS with respect to the selection of the availability zone?A .  Always select the AZ while launching an instanceB .  Always select the US-East-1-a zone for HAC .  Do not...

January 12, 2018 No Comments READ MORE +

Which of the following key combinations he can use to recover the IMEI number?

Ron. a computer forensics expert, Is Investigating a case involving corporate espionage. He has recovered several mobile computing devices from the crime scene. One of the evidence that Ron possesses is a mobile phone from Nokia that was left in on condition. Ron needs to recover the IMEI number of...

January 12, 2018 No Comments READ MORE +

Which destination port or ports should you open?

You are the Office 365 administrator for a company. You plan to use Skype for Business Online on all mobile devices. Employees currently use the following device types: Some users report that they do not receive push notifications. Skype for Business Online must be able to send push notifications to...

January 12, 2018 No Comments READ MORE +

What are two reasons why a route might be hidden? (Choose two.)

What are two reasons why a route might be hidden? (Choose two.)A . route preferenceB . routing loopC . invalid next hopD . routing policyView AnswerAnswer: C, D

January 12, 2018 No Comments READ MORE +

What does the following command do with respect to the Amazon EC2 security groups?

What does the following command do with respect to the Amazon EC2 security groups? ec2-revoke RevokeSecurityGroup IngressA . Removes one or more security groups from a rule.B . Removes one or more security groups from an Amazon EC2 instance.C . Removes one or more rules from a security group.D ....

January 12, 2018 No Comments READ MORE +

What should you do?

You manage an Azure subscription with virtual machines (VMs) that are running in Standard mode. You need to reduce the storage costs associated with the VMs. What should you do?A . Locate and remove orphaned disks.B . Add the VMs to an affinity group.C . Change VMs to the Basic...

January 12, 2018 No Comments READ MORE +