Which PIM multicast type is designed to be used for many-to-many applications within individual PIM domains?

Which PIM multicast type is designed to be used for many-to-many applications within individual PIM domains?A . PIM-DMB . Bidir-PIMC . PIM-SMD . SSMView AnswerAnswer: B

February 14, 2018 No Comments READ MORE +

Which commands are used to load modules into the Linux kernel? (Choose TWO correct answers.)

Which commands are used to load modules into the Linux kernel? (Choose TWO correct answers.)A . insmodB . loadmodC . kernloadD . modprobeE . probemodView AnswerAnswer: A, D

February 14, 2018 No Comments READ MORE +

Which three actions should you perform?

You manage a cloud service that has a web application named WebRole1. WebRole1 writes error messages to the Windows Event Log. Users report receiving an error page with the following message: "Event 26 has occurred. Contact your system administrator." You need to access the WebRole1 event log. Which three actions...

February 14, 2018 No Comments READ MORE +

What do you think is a correct statement about the limitations of Amazon SQS?

You are architecting an auto-scalable batch processing system using video processing pipelines and Amazon Simple Queue Service (Amazon SQS) for a customer. You are unsure of the limitations of SQS and need to find out. What do you think is a correct statement about the limitations of Amazon SQS?A .  It supports an...

February 14, 2018 No Comments READ MORE +

Which of the following best describes the Integrated Information Infrastructure Reference Model?

Which of the following best describes the Integrated Information Infrastructure Reference Model?A . It can be used to determine the capability level of an enterpriseB . It is a deliverable from Phase AC . It is an Application Architecture Reference Mode!D . It provides a conceptual structure for architecture governanceE...

February 14, 2018 No Comments READ MORE +

Which HSRP parameters must match, to ensure proper functionality?

Which HSRP parameters must match, to ensure proper functionality?A . group parametersB . priority parametersC . preempt parametersD . tracking parametersView AnswerAnswer: A

February 14, 2018 No Comments READ MORE +

Which action accomplishes this task?

An access switch at a remote location is connected to the spanning-tree root with redundant uplinks. A network engineer notices that there are issues with the physical cabling of the current root port. The engineer decides to force the secondary link to be the desired forwarding root port. Which action...

February 14, 2018 No Comments READ MORE +

Which of the following act requires employer’s standard national numbers to identify them on standard transactions?

Which of the following act requires employer’s standard national numbers to identify them on standard transactions?A . SOXB . HIPAAC . DMCAD . PCI-DSSView AnswerAnswer: B

February 14, 2018 No Comments READ MORE +

Which of the following should Kim enable to ensure that the network only allows 802.11n clients?

Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensure that the network only allows 802.11n clients?A . Name the SSID on the 802.11n network onlyB . Limit the DHCP address poolC . Disable 802.11b and 802.11gD . Only use WPA encryptionView...

February 14, 2018 No Comments READ MORE +

How many Update Domains (UDs) and Fault Domains (FDs) should you create?

Topic 2, Exam Set B A company has an Azure subscription with four virtual machines (VM) that are provisioned in an availability set. The VMs support an existing web service. The company expects additional demand for the web service. You add 10 new VMs to the environment. You need to...

February 14, 2018 No Comments READ MORE +