Which action ensures that the company AS does not become a transit AS?

A company is Multi-Homed to different service providers running BGP. Which action ensures that the company AS does not become a transit AS?A . Create a distribute list that filters all routes except the default route and applies to both BGP neighbour interfaces in the inbound directionB . Create a...

June 17, 2018 No Comments READ MORE +

What is the cabling best practice for this configuration?

You are asked to cable up a VxRail G Series cluster to a redundant pair of 1/10G switches. What is the cabling best practice for this configuration?A . Cable ports 1 and 2 to oneswitch. Cable ports 3 and 4 to the other switch.B . Cable ports 1 and 2...

June 17, 2018 No Comments READ MORE +

Which of the following statements best describes the AWS service CloudTrail?

You are very concerned about security on your network because you have multiple programmers testing APIs and SDKs and you have no idea what is happening. You think CloudTrail may help but arenot sure what it does. Which of the following statements best describes the AWS service CloudTrail?A .  With AWS CloudTrail...

June 17, 2018 No Comments READ MORE +

TOGAF Part VII, Architecture Capability Framework recommends use of an ADM cycle for establishing an architecture practice. In this scenario which architecture would describe the organizational structure for the architecture practice?

TOGAF Part VII, Architecture Capability Framework recommends use of an ADM cycle for establishing an architecture practice. In this scenario which architecture would describe the organizational structure for the architecture practice?A . Application ArchitectureB . Business ArchitectureC . Data ArchitectureD . Technology ArchitectureView AnswerAnswer: B

June 17, 2018 No Comments READ MORE +

What are limits of vCenter Libraries in vSphere 6.5?

What are limits of vCenter Libraries in vSphere 6.5?A . Total items 2000, Biggest item size 1TB, total libraries per VC 1000, total items per library 1000 and max number of syncs 16B . Total items 4000, Biggest item size 512TB, total libraries per VC 2000, total items per library...

June 17, 2018 No Comments READ MORE +

Every user you create in the lAM system starts with ____ _

Every user you create in the lAM system starts with ____ _A . full permissionsB . no permissionsC . partial permissionsView AnswerAnswer: B

June 17, 2018 No Comments READ MORE +

Which two options are valid WAN connectivity methods? (Choose two.)

Which two options are valid WAN connectivity methods? (Choose two.)A . PPPB . WAPC . DSLD . L2TPv3E . EthernetView AnswerAnswer: A, C Explanation: On each WAN connection, data is encapsulated into frames before it crosses the WAN link. The following are typical WAN protocols:

June 17, 2018 No Comments READ MORE +

Which two actions should you perform?

You are the Office 365 administrator for Contoso, Ltd. Some email messages sent from the trusted domain fabrikam.com are being rejected as spam. Some of these email messages originate inside the fabrikam.com network, and some of them originate from an application in the fabrikam.com co-located data center. The fabrikam.com systems...

June 17, 2018 No Comments READ MORE +

Which two authentication methods can be used to accomplish this?

An engineer would like to setup secure authentication for a wireless network that will utilize single sign-on. Which two authentication methods can be used to accomplish this? (Choose two.)A . LDAPB . RADIUSC . Local authenticationD . WEPE . PSKView AnswerAnswer: A, B

June 17, 2018 No Comments READ MORE +

What should you create?

You administer a Microsoft SQL Server 2016 database named Contoso on a server named Server01. You need to track all SELECT statements issued in the Contoso database only by users in a role named Sales. What should you create?A . An AlertB . A Resource PoolC . An Extended Event...

June 17, 2018 No Comments READ MORE +