Which four Windows PowerShell commands should you run in sequence?

DRAG DROP DRAG DROP A company uses Exchange Online. You need to create a shared mailbox and a group that has full access to the shared mailbox. Which four Windows PowerShell commands should you run in sequence? To answer, move the appropriate commands from the list of commands to the...

June 1, 2018 No Comments READ MORE +

You should always work with original evidence

You should always work with original evidenceA . TrueB . FalseView AnswerAnswer: B

June 1, 2018 No Comments READ MORE +

Which log shows the related events between these components?

An administrator is troubleshooting network communications between a vCenter Server and an ESXi 6.5 host. Which log shows the related events between these components?A . /var/log/fdm.logB . /var/log/vpxa.logC . /var/log/hostd.logD . /var/log/auth.logView AnswerAnswer: B

June 1, 2018 No Comments READ MORE +

Which command path correctly describes how to access and troubleshoot clients with Cisco WCS version 7.0?

Which command path correctly describes how to access and troubleshoot clients with Cisco WCS version 7.0?A . Tools > Clients > select displayed client's MAC addressB . Tools > Clients > enter client's MAC addressC . Monitor > Clients > click displayed client's MAC addressD . Monitor > Clients >...

June 1, 2018 No Comments READ MORE +

What three steps are necessary to enable Jumbo Frames for use with an iSCSI storage array? (Choose three.)

What three steps are necessary to enable Jumbo Frames for use with an iSCSI storage array? (Choose three.)A . Configure the MTU on the physical switch.B . Configure the MTU on the virtual switch.C . Configure the MTU on the VTEE . Configure the MTU on the LAG group.F ....

June 1, 2018 No Comments READ MORE +

Which two options are advantages of a spine and leaf architecture? (Choose two )

Which two options are advantages of a spine and leaf architecture? (Choose two )A . robust multipathingB . traffic that is optimized for east-west communicationC . star topologyD . traffic that is optimized for north-south communicationE . exponential scalabilityView AnswerAnswer: AE

May 31, 2018 No Comments READ MORE +

Which of the following cloud models should the technician identify in the proposal?

A network technician is working on a proposal for email migration from an on-premises email system to a vendor-hosted email in the cloud. The technician needs to explain to management what type of cloud model will be utilized with the cloud-hosted email. Which of the following cloud models should the...

May 31, 2018 No Comments READ MORE +

What new feature was introduced to the Content Library in vSphere 6.5?

What new feature was introduced to the Content Library in vSphere 6.5?A . Mount an ISO directly from the Content Library.B . Deploy a virtual machine from an OVF Package in a Content Library.C . Upload a File from a URL to a Library Item.D . Upload a File from...

May 31, 2018 No Comments READ MORE +

Which following statement is incorrect in regards to the use of credential reports?

After a major security breach your manager has requested a report of all users and their credentials in AWS. You discover that in IAM you can generate and download a credential report that lists all users in your account and the status of their various credentials, including passwords, access keys, MFA devices, and signing...

May 31, 2018 No Comments READ MORE +

Where is the hidden swap file in Windows located?

A swap file is a space on a hard disk used as the virtual memory extension of a computer's RAM. Where is the hidden swap file in Windows located?A . C:pagefile.sysB . C:hiberfil.sysC . C:config.sysD . C:ALCSetup.logView AnswerAnswer: A

May 31, 2018 No Comments READ MORE +