What is an array LUN?
What is an array LUN?A . a LUN that is used only as a part of a volume groupB . a LUN provisioned on third-party storage that ONTAP will use in a RAID groupC . a LUN provisioned in ONTAP that is mounted by a connected hostD . a LUN...
Which three actions should you perform in sequence?
DRAG DROP You are developing an Azure web app named WebApp1. WebApp1 uses an Azure App Service plan named Plan1 that uses the B1 pricing tier. You need to configure WebApp1 to add additional instances of the app when CPU usage exceeds 70 percent for 10 minutes. Which three actions...
The IP address 192.168.100.1 belongs to which class of IP address space?
The IP address 192.168.100.1 belongs to which class of IP address space?A . Class AB . Class BC . Class CD . Class DView AnswerAnswer: C
Where does the configuration reside when a helper address is configured to support DHCP?
Where does the configuration reside when a helper address is configured to support DHCP?A . on the switch trunk interface.B . on the router closest to the client.C . on the router closest to the server.D . on every router along the path.View AnswerAnswer: B
Given the output shown from this Cisco Catalyst 2950, what is the reason that interface FastEthernet 0/10 is not the root port for VLAN 2?
Refer to the exhibit. Given the output shown from this Cisco Catalyst 2950, what is the reason that interface FastEthernet 0/10 is not the root port for VLAN 2?A . This switch has more than one interface connected to the root network segment in VLAN 2.B . This switch is...
attack successful?
Recently several employees were victims of a phishing email that appeared to originate from the company president. The email claimed the employees would be disciplined if they did not click on a malicious link in the message. Which of the following principles of social engineering made this attack successful?A ....
Which option lists the modes that are available for configuring UDLD on a Cisco switch?
Which option lists the modes that are available for configuring UDLD on a Cisco switch?A . normal and aggressiveB . active and aggressiveC . normal and activeD . normal and passiveE . normal and standbyView AnswerAnswer: A Explanation: The Cisco-proprietary UDLD protocol monitors the physical configuration of the links between...
What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?
What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?A . lowest port MAC addressB . port priority number and MAC address.C . VTP revision numberD . highest port priority number.E . path costView AnswerAnswer: E
Which CLI command is used to move epsilon to a new node?
Which CLI command is used to move epsilon to a new node?A . storage failover takeoverB . cluster setupC . cluster identity modifyD . cluster modifyView AnswerAnswer: D
Which NTP type designates a router without an external reefrence clock as an authoritative time source?
Which NTP type designates a router without an external reefrence clock as an authoritative time source?A . serverB . peerC . masterD . clientView AnswerAnswer: C