Which PIM multicast type is designed to be used for many-to-many applications within individual PIM domains?
Which PIM multicast type is designed to be used for many-to-many applications within individual PIM domains?A . PIM-DMB . Bidir-PIMC . PIM-SMD . SSMView AnswerAnswer: B
Which commands are used to load modules into the Linux kernel? (Choose TWO correct answers.)
Which commands are used to load modules into the Linux kernel? (Choose TWO correct answers.)A . insmodB . loadmodC . kernloadD . modprobeE . probemodView AnswerAnswer: A, D
Which three actions should you perform?
You manage a cloud service that has a web application named WebRole1. WebRole1 writes error messages to the Windows Event Log. Users report receiving an error page with the following message: "Event 26 has occurred. Contact your system administrator." You need to access the WebRole1 event log. Which three actions...
What do you think is a correct statement about the limitations of Amazon SQS?
You are architecting an auto-scalable batch processing system using video processing pipelines and Amazon Simple Queue Service (Amazon SQS) for a customer. You are unsure of the limitations of SQS and need to find out. What do you think is a correct statement about the limitations of Amazon SQS?A . It supports an...
Which of the following best describes the Integrated Information Infrastructure Reference Model?
Which of the following best describes the Integrated Information Infrastructure Reference Model?A . It can be used to determine the capability level of an enterpriseB . It is a deliverable from Phase AC . It is an Application Architecture Reference Mode!D . It provides a conceptual structure for architecture governanceE...
Which HSRP parameters must match, to ensure proper functionality?
Which HSRP parameters must match, to ensure proper functionality?A . group parametersB . priority parametersC . preempt parametersD . tracking parametersView AnswerAnswer: A
Which action accomplishes this task?
An access switch at a remote location is connected to the spanning-tree root with redundant uplinks. A network engineer notices that there are issues with the physical cabling of the current root port. The engineer decides to force the secondary link to be the desired forwarding root port. Which action...
Which of the following act requires employer’s standard national numbers to identify them on standard transactions?
Which of the following act requires employer’s standard national numbers to identify them on standard transactions?A . SOXB . HIPAAC . DMCAD . PCI-DSSView AnswerAnswer: B
Which of the following should Kim enable to ensure that the network only allows 802.11n clients?
Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensure that the network only allows 802.11n clients?A . Name the SSID on the 802.11n network onlyB . Limit the DHCP address poolC . Disable 802.11b and 802.11gD . Only use WPA encryptionView...
How many Update Domains (UDs) and Fault Domains (FDs) should you create?
Topic 2, Exam Set B A company has an Azure subscription with four virtual machines (VM) that are provisioned in an availability set. The VMs support an existing web service. The company expects additional demand for the web service. You add 10 new VMs to the environment. You need to...