What is the characteristic of bidirectional PIM?

What is the characteristic of bidirectional PIM?View AnswerAnswer: Explicitly builds shared bidirectional trees.

January 23, 2018 No Comments READ MORE +

Which three statements about Cisco host-based IPS solutions are true? (Choose three.)

Which three statements about Cisco host-based IPS solutions are true? (Choose three.)A . It can view encrypted files.B . It can have more restrictive policies than network-based IPD . It can generate alerts based on behavior at the desktop level.E . It can be deployed at the perimeter.F . It...

January 23, 2018 1 Comment READ MORE +

Which of the following best describes the TOGAF Architecture Governance Framework?

Which of the following best describes the TOGAF Architecture Governance Framework?A . An approach to ensure the effectiveness of an organization's architecturesB . An architecture of building blocks and corresponding standards, together with associated graphicsC . An example set of Architecture PrinciplesD . A reference model that includes information provider...

January 23, 2018 No Comments READ MORE +

Why is this?

You have made changes to the security setting and created a new user right; however, when you go to save the changes the system will not allow you to save your changes. Why is this?A . Changes are effective straight away, it is not necessary to save them.B . You...

January 23, 2018 No Comments READ MORE +

Which feature of vSphere networking protects hosts from losing connection to vCenter Server as a result of misconfiguration of the management network?

Which feature of vSphere networking protects hosts from losing connection to vCenter Server as a result of misconfiguration of the management network?A . NIC TeamingB . Private VLANC . RollbackD . Health CheckView AnswerAnswer: C Explanation: By rolling configuration changes back, vSphere protects hosts from losing connection to vCenter Server...

January 23, 2018 No Comments READ MORE +

Which are three of the supported protocols?

VCSA backup can be backed up and sent to different location via several different protocols. Which are three of the supported protocols? (Choose three.)A . CIFSB . SCPC . HTTPD . FTPSE . AFPView AnswerAnswer: B,C,D

January 23, 2018 No Comments READ MORE +

Which five actions should you recommended be performed in sequence?

DRAG DROP You have five servers that run Microsoft Windows 2012 R2. Each server hosts a Microsoft SQL Server instance. The topology for the environment is shown in the following diagram. You have an Always On Availability group named AG1. The details for AG1 are shown in the following table....

January 23, 2018 No Comments READ MORE +

How frequently does the Profiled Endpoints dashlet refresh data?

How frequently does the Profiled Endpoints dashlet refresh data?A . every 30 secondsB . every 60 secondsC . every 2 minutesD . every 5 minutesView AnswerAnswer: B

January 23, 2018 No Comments READ MORE +

Which IP address will be used to source NAT the Internet traffic coming from a workstation with the IP address 10.0.1.10/24?

Examine the exhibit, which contains a virtual IP and a firewall policy configuration. The WAN(port1) interface has the IP address 10.200.1.1/24. The LAN(port2) interface has the IP address 10.0.1.254/24. The top firewall policy has NAT enabled using outgoing interface address. The second firewall policy configured with a virtual IP (VIP)...

January 23, 2018 No Comments READ MORE +

Which six optional TLVs are valid? (Choose six.)

Which six optional TLVs are valid? (Choose six.)A . Port description TLVB . System name TLVC . System description TLVD . System capabilities TLVE . Management address TLVF . Specific TLVsG . Source ID TLVH . Native hostname TLVView AnswerAnswer: ABCDEF

January 23, 2018 No Comments READ MORE +