At which layer of the OSI model does error checking occur with IPv6?

At which layer of the OSI model does error checking occur with IPv6?A . Layer 2B . Layer 3C . Layer 4D . Layer 7View AnswerAnswer: C

January 31, 2018 No Comments READ MORE +

Which functionality does the Cisco ISE self-provisioning flow provide?

Which functionality does the Cisco ISE self-provisioning flow provide?A . It provides support for native supplicants, allowing users to connect devices directly to the network.B . It provides the My Devices portal, allowing users to add devices to the network.C . It provides support for users to install the Cisco...

January 31, 2018 No Comments READ MORE +

Because the maximum support rate of 802.11a is the same as 802.11g, so the protocol of 802.11a is backwards compatible with 802.11g protocol.

Because the maximum support rate of 802.11a is the same as 802.11g, so the protocol of 802.11a is backwards compatible with 802.11g protocol.A . TrueB . FalseView AnswerAnswer: B

January 31, 2018 No Comments READ MORE +

Which statement is true, as relates to classful or classless routing?

Which statement is true, as relates to classful or classless routing?A . Classful routing protocols send the subnet mask in routing updates.B . RIPv1 and OSPF are classless routing protocols.C . Automatic summarization at classful boundaries can cause problems on discontiguous subnets.D . EIGRP and OSPF are classful routing protocols...

January 31, 2018 No Comments READ MORE +

What should you do?

You have an application that needs to use single sign-on (SSO) between the company’s Azure Active Directory (Azure AD) and the on-premises Windows Server 2012 R2 Active Directory. You configure the application to use Integrated Windows Authentication (IWA). You install an Application Proxy connector in the same domain as the...

January 31, 2018 No Comments READ MORE +

Which of the following statements is incorrect when preserving digital evidence?

Which of the following statements is incorrect when preserving digital evidence?A . Document the actions and changes that you observe in the monitor, computer, printer, or in other peripheralsB . Verily if the monitor is in on, off, or in sleep modeC . Remove the power cable depending on the...

January 31, 2018 No Comments READ MORE +

Which of the following architectures in the Architecture Continuum contains the most re-usable architecture elements?

Which of the following architectures in the Architecture Continuum contains the most re-usable architecture elements?A . Common Systems ArchitecturesB . Foundation ArchitecturesC . Industry ArchitecturesD . Organization-Specific ArchitecturesView AnswerAnswer: B

January 31, 2018 No Comments READ MORE +

Which of the following TOGAF components was created to enable architects to design architectures addressing Boundaryless Information Flow?

Which of the following TOGAF components was created to enable architects to design architectures addressing Boundaryless Information Flow?A . The Architecture RepositoryB . The Enterprise ContinuumC . The Integrated Information Infrastructure ModelD . The TOGAF Technical Reference ModelView AnswerAnswer: C

January 30, 2018 No Comments READ MORE +

What should you do?

You manage a cloud service that has one Web Role instance, and several Worker Role instances. The cloud service has multiple tiers. Different groups develop and maintain each tier. You need to ensure that the cloud service remains highly available and responsive when the Worker Roles are performing extensive work....

January 30, 2018 No Comments READ MORE +

Fill in the blank: The _________ collects logs and sends them to the _________ .

Fill in the blank: The _________ collects logs and sends them to the _________ .A . Log server; security management serverB . Log server; Security GatewayC . Security management server; Security GatewayD . Security Gateways; log serverView AnswerAnswer: D

January 30, 2018 2 Comments READ MORE +