Which are two requirements for configuring vCenter HA? (Choose two)
Which are two requirements for configuring vCenter HA? (Choose two)A . A secondary NIC on the active node must be create and configuredB . A management and heartbeat network must be created and configuredC . A default gateway entry must be added for the cluster networkD . All components must...
Which four mandatory TLVs are valid? (Choose four. )
Which four mandatory TLVs are valid? (Choose four. )A . End of LLDPDUB . Chassis IDC . Port IDD . Time To LiveE . VLAN IDF . System name IDG . Description IDView AnswerAnswer: ABCD
Given the configuration and routing table shown in the exhibit, which routes will be advertised to OSPF neighbors because of the demo policy?
168.51.0/24 *[Static/5] 00:00:06 >to 172.16.1.2 via ge-0/0/2.0 user@router> show configuration policy-options policy-statement demo { term 1 { from { route-filter 192.168.0.0/16 longer accept; } then reject; } } user@router> show configuration protocols ospf export demo; area 0.0.0.0 { interface ge-0/0/2.0; } -- Exhibit -- Given the configuration and routing table...
As shown below, which routes will R2 learn?
As shown below, which routes will R2 learn? A . R2 can learn R1 all routes .B . R2 can learn 10.1.1.0/24 router.C . R2 can learn 10.1.2.0/24 and 10.1.3.0/24 two routes.D . R2 can receive R1 LSP, but can not be added to the routing table.View AnswerAnswer: A
Which IPv6 first-hop security feature blocks traffic sourced from IPv6 addresses that are outside the prefix gleaned from router advertisements?
Which IPv6 first-hop security feature blocks traffic sourced from IPv6 addresses that are outside the prefix gleaned from router advertisements?A . IPv6 source guard.B . IPv6 RA guard.C . IPv6 prefix guard.D . IPv6 DHCP guard.View AnswerAnswer: C
Which type of Amazon EC2 instances should you use to reduce the backlog in the most cost efficient way?
You have a video transcoding application running on Amazon EC2. Each instance pol ls a queue to find out which video should be transcoded, and then runs a transcoding process. If this process is interrupted, the video will be transcoded by another instance based on the queuing system. You have a large backlog of...
Which three URLs can be changed?
You are the Office 365 administrator for your company. The company uses Microsoft Skype for Business Online and wants to customize Skype for Business meeting invitations. You need to identify the URLs that can be changed on the Lync meeting invitations from the Lync admin center. Which three URLs can...
Which of the following risk management strategies has the organization employed?
Management is reviewing the results of a recent risk assessment of the organization’s policies and procedures. During the risk assessment it is determined that procedures associated with background checks have not been effectively implemented. In response to this risk, the organization elects to revise policies and procedures related to background...
What is the function of the peer ignore command?
What is the function of the peer ignore command?A . Deletes a BGP peer.B . Retains all configurations of the peer, and maintains the BGP peer relationship with the peer, but does not receive the routes sent from the peer.C . Retains all configurations of the peer, and maintains the...
Which of the following physical security controls is MOST likely to be susceptible to a false positive?
Which of the following physical security controls is MOST likely to be susceptible to a false positive?A . Identification cardB . Biometric deviceC . Proximity readerD . Video cameraView AnswerAnswer: C