Which option should you select?

HOTSPOT You manage an Azure Web Site for a consumer-product company. The website runs in Standard mode on a single medium instance. You expect increased traffic to the website due to an upcoming sale during a holiday weekend. You need to ensure that the website performs optimally when user activity...

January 25, 2018 No Comments READ MORE +

Which two actions should you perform?

You migrate a Windows Server .NET web application to Azure Cloud Services. You need enable trace logging for the application. Which two actions should you perform? Each correct answer presents part of the solution.A . Update the service definition file.B . Update the Azure diagnostics configuration.C . Update the service...

January 25, 2018 No Comments READ MORE +

In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587?

In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587?A . 20B . 21C . 23D . 25View AnswerAnswer: D

January 25, 2018 No Comments READ MORE +

You create a workflow and set the scope to User (default). User A owns the workflow. User B is making bulk changes on records that will trigger the workflow. Which records will this workflow affect?

You create a workflow and set the scope to User (default). User A owns the workflow. User B is making bulk changes on records that will trigger the workflow. Which records will this workflow affect?A . records owned by users in the same business unit as User BB . records...

January 25, 2018 No Comments READ MORE +

Does the solution meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

January 25, 2018 No Comments READ MORE +

What happens to data on an ephemeral volume of an EBS-backed EC2 instance if it is terminated or if it fails?

What happens to data on an ephemeral volume of an EBS-backed EC2 instance if it is terminated or if it fails?A .  Data is automatically copied to another volume.B .  The volume snapshot is saved in S3.C .  Data persists.D .  Data is deleted.View AnswerAnswer: D Explanation: Any data on the...

January 25, 2018 No Comments READ MORE +

You are configuring a Cisco IOS Firewall on a WAN router that is operating as a Trusted Relay Point (TRP) in a voice network. Which feature must you configure to open data-channel pinholes for voice packets that are sourced from a TRP within the WAN?

You are configuring a Cisco IOS Firewall on a WAN router that is operating as a Trusted Relay Point (TRP) in a voice network. Which feature must you configure to open data-channel pinholes for voice packets that are sourced from a TRP within the WAN?A . CACB . ACLC ....

January 25, 2018 No Comments READ MORE +

What should be done to resolve this problem?

A BMC interface webpage is reachable but unresponsive. What should be done to resolve this problem?A . NDU to latest bundle of VxRail softwareB . Reboot the nodeC . Reset the BMC through/tmp/vspexblue/bin/ipmitool mc reset coldD . Upgrade the BMC firmwareView AnswerAnswer: D

January 25, 2018 No Comments READ MORE +

Which three algorithms should be avoided due to security concerns? (Choose three.)

Which three algorithms should be avoided due to security concerns? (Choose three.)A . DES for encryptionB . SHA-1 for hashingC . 1024-bit RSAD . AES GCM mode for encryptionE . HMAC-SHA-1F . 256-bit Elliptic Curve Diffie-HellmanG . 2048-bit Diffie-HellmanView AnswerAnswer: A,B,C

January 25, 2018 No Comments READ MORE +

What should you recommend?

You are designing a solution that will aggregate and analyze data from Internet of Things (IoT) devices. The solution must meet the following requirements: ・ Store petabytes of data ・ Use shared access policies to provide service connections to the IoT event source. ・ Conduct analysis of data in near...

January 25, 2018 No Comments READ MORE +