Which of the following architectural choices should you make?

You have a web application running on six Amazon EC2 instances, consuming about 45% of resources on each instance. You are using auto-scaling to make sure that six instances are running at all times. The number of requests this application processes is consistent and does not experience spikes. The application is critical...

August 15, 2018 No Comments READ MORE +

Which of the following statements are correct regarding MAC address of VRRP packet?

Which of the following statements are correct regarding MAC address of VRRP packet?A . The destination MAC is broadcast MAC address.B . The destination MAC is multicast MAC address.C . The source address is virtual MAC address.D . The source address is physical MAC address of Master.View AnswerAnswer: BC

August 15, 2018 No Comments READ MORE +

What should you do?

DRAG DROP You are developing an ASP.NET MVC application. You plan to use OAuth to authenticate users to the application. You need to use the correct authentication data in the application. What should you do? To answer, drag the appropriate data element to the correct location or locations. Each data...

August 15, 2018 No Comments READ MORE +

Which option is an example of a Tested Reference Configuration?

Which option is an example of a Tested Reference Configuration?A . BE6000B . VCSC . TMSD . UCMView AnswerAnswer: A

August 15, 2018 No Comments READ MORE +

Does the solution meet the goal?

Topic 1, Implementing SQL in Azure Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets stated goals. Your company plans to use Microsoft Azure Resource Manager templates for all future...

August 15, 2018 No Comments READ MORE +

What is an advantage of implementing a Trusted Platform Module for disk encryption?

What is an advantage of implementing a Trusted Platform Module for disk encryption?A . It provides hardware authentication.B . It allows the hard disk to be transferred to another device without requiring re-encryption.disC . It supports a more complex encryption algorithm than other disk-encryption technologies.D . It can protect against...

August 15, 2018 No Comments READ MORE +

What are two ways to advertise networks into BGP? (Choose two.)

What are two ways to advertise networks into BGP? (Choose two.)A . using the neighbor router BGP commandB . using a route policy in Cisco IOS XR Software or using a route map in Cisco IOS Software or Cisco IOS XE SoftwareC . using route redistribution into BGPD . using...

August 15, 2018 No Comments READ MORE +

The following is part of the output information of the router RTD, the correct description of the output information is:

The following is part of the output information of the router RTD, the correct description of the output information is: A . The version of IGMP enabled on this interface is version 1.B . IGMP status of this interface is down.C . Configure the interval for sending IGMP query messages...

August 15, 2018 No Comments READ MORE +

Which tool should you use?

A user reports that a computer was slower than expect during the last week. You need to identify any application failures that occurred during the last week. Which tool should you use?A . Performance MonitorB . Task ManagerC . Resource MonitorD . Reliability MonitorView AnswerAnswer: D Explanation: http://www.pcworld.com/article/2999237/windows/how-to-use-windows-10s-reliability-monitor-to-fix-and-fine-tune-your-pc.html

August 15, 2018 No Comments READ MORE +