Which configuration should you use?
You are implementing a SQL Server 2016 five-node failover cluster. You need to choose a quorum configuration. Which configuration should you use?A . Distributed File System (DFS)B . Node MajorityC . Cluster Shared Volume (CSV)D . Node and Disk MajorityView AnswerAnswer: D Explanation: Node and Disk Majority (recommended for clusters...
How to verify that TACACS+ connectivity to a device?
How to verify that TACACS+ connectivity to a device?A . You successfully log in to the device by using the local credentials.B . You connect to the device using SSH and receive the login prompt.C . You successfully log in to the device by using ACS credentials.D . You connect...
Which configuration tool should be used to allow the One Button to Push feature to work?
A user wants to use the One Button to Push feature on a Cisco TelePresence System 500-32 video endpoint. Which configuration tool should be used to allow the One Button to Push feature to work?A . Cisco Unified Communications Manager server, phones, devices, One Button to PushB . Cisco Gigaswitch...
Which of the below mentioned options is recommended by AWS with respect to the selection of the availability zone?
A user is launching an EC2 instance in the US East region. Which of the below mentioned options is recommended by AWS with respect to the selection of the availability zone?A . Always select the AZ while launching an instanceB . Always select the US-East-1-a zone for HAC . Do not...
Which of the following key combinations he can use to recover the IMEI number?
Ron. a computer forensics expert, Is Investigating a case involving corporate espionage. He has recovered several mobile computing devices from the crime scene. One of the evidence that Ron possesses is a mobile phone from Nokia that was left in on condition. Ron needs to recover the IMEI number of...
Would you recommend?
Your customers are seeking desktop telephones for their administrative staff. They are interested in supporting rich audio and video collaboration features. Would you recommend?A . 9641B . H175C . E159D . 9621View AnswerAnswer: B
Which destination port or ports should you open?
You are the Office 365 administrator for a company. You plan to use Skype for Business Online on all mobile devices. Employees currently use the following device types: Some users report that they do not receive push notifications. Skype for Business Online must be able to send push notifications to...
What are two reasons why a route might be hidden? (Choose two.)
What are two reasons why a route might be hidden? (Choose two.)A . route preferenceB . routing loopC . invalid next hopD . routing policyView AnswerAnswer: C, D
What does the following command do with respect to the Amazon EC2 security groups?
What does the following command do with respect to the Amazon EC2 security groups? ec2-revoke RevokeSecurityGroup IngressA . Removes one or more security groups from a rule.B . Removes one or more security groups from an Amazon EC2 instance.C . Removes one or more rules from a security group.D ....
What should you do?
You manage an Azure subscription with virtual machines (VMs) that are running in Standard mode. You need to reduce the storage costs associated with the VMs. What should you do?A . Locate and remove orphaned disks.B . Add the VMs to an affinity group.C . Change VMs to the Basic...