Your company deploys Microsoft Lync Online. You deploy the Microsoft Lync 2010 client to all client computers. All users log on to the local domain. You need to prevent users from modifying the Advanced Connection Settings on the Lync 2010 client. What should you do?

Your company deploys Microsoft Lync Online. You deploy the Microsoft Lync 2010 client to all client computers. All users log on to the local domain. You need to prevent users from modifying the Advanced Connection Settings on the Lync 2010 client. What should you do?A . Deploy a Group Policy...

January 24, 2018 No Comments READ MORE +

What should you recommend?

You are designing a Windows Azure application that will store data in two SQL Azure databases. The application will insert data in both databases as part of a single logical operation. You need to recommend an approach for maintaining data consistency across the databases. What should you recommend?A . Execute...

January 24, 2018 No Comments READ MORE +

Which statement is true of the logging configuration on the Cisco ASA?

Which statement is true of the logging configuration on the Cisco ASA?A . The contents of the internal buffer will be saved to an FTP server before the buffer is overwritten.B . The contents of the internal buffer will be saved to flash memory before the buffer is overwritten.C ....

January 23, 2018 No Comments READ MORE +

How many address families can a single 0SPFv3 instance support?

How many address families can a single 0SPFv3 instance support?A . 5B . 2C . 1D . 10View AnswerAnswer: C

January 23, 2018 No Comments READ MORE +

What is the characteristic of bidirectional PIM?

What is the characteristic of bidirectional PIM?View AnswerAnswer: Explicitly builds shared bidirectional trees.

January 23, 2018 No Comments READ MORE +

Which three statements about Cisco host-based IPS solutions are true? (Choose three.)

Which three statements about Cisco host-based IPS solutions are true? (Choose three.)A . It can view encrypted files.B . It can have more restrictive policies than network-based IPD . It can generate alerts based on behavior at the desktop level.E . It can be deployed at the perimeter.F . It...

January 23, 2018 1 Comment READ MORE +

Which of the following best describes the TOGAF Architecture Governance Framework?

Which of the following best describes the TOGAF Architecture Governance Framework?A . An approach to ensure the effectiveness of an organization's architecturesB . An architecture of building blocks and corresponding standards, together with associated graphicsC . An example set of Architecture PrinciplesD . A reference model that includes information provider...

January 23, 2018 No Comments READ MORE +

Why is this?

You have made changes to the security setting and created a new user right; however, when you go to save the changes the system will not allow you to save your changes. Why is this?A . Changes are effective straight away, it is not necessary to save them.B . You...

January 23, 2018 No Comments READ MORE +

Which feature of vSphere networking protects hosts from losing connection to vCenter Server as a result of misconfiguration of the management network?

Which feature of vSphere networking protects hosts from losing connection to vCenter Server as a result of misconfiguration of the management network?A . NIC TeamingB . Private VLANC . RollbackD . Health CheckView AnswerAnswer: C Explanation: By rolling configuration changes back, vSphere protects hosts from losing connection to vCenter Server...

January 23, 2018 No Comments READ MORE +

Which are three of the supported protocols?

VCSA backup can be backed up and sent to different location via several different protocols. Which are three of the supported protocols? (Choose three.)A . CIFSB . SCPC . HTTPD . FTPSE . AFPView AnswerAnswer: B,C,D

January 23, 2018 No Comments READ MORE +