What should you do?
Your company has a hybrid deployment of Office 365. You need to create a group. The group must have the following characteristics: What should you do?A . Create a distribution group and configure the Mail Flow Settings.B . Create a dynamic distribution group.C . Create a new role group.D ....
A network engineer is migrating the server farm from 1 Gb/s Ethernet connectivity la 10 Gb/s Ethernet connectivity What two Cisco Nexus Fabric Extenders support 10 Gb/s server connectivity? (Choose two.)
A network engineer is migrating the server farm from 1 Gb/s Ethernet connectivity la 10 Gb/s Ethernet connectivity What two Cisco Nexus Fabric Extenders support 10 Gb/s server connectivity? (Choose two.)A . Nexus 2148TB . Nexus 2232PPC . Nexus 2248TPD . Nexus 2248PQE . Nexus 2224TPView AnswerAnswer: BD
In the same LAN, if some IGMPv1 routers exist in the LAN, IGMPv1 must be forcibly configured for all routers in the subnet to use normally.
In the same LAN, if some IGMPv1 routers exist in the LAN, IGMPv1 must be forcibly configured for all routers in the subnet to use normally.A . TrueB . FalseView AnswerAnswer: A
What are the types of firewalls developed so far?
What are the types of firewalls developed so far?A . Packet filtering firewallB . Proxy firewallC . Anti-virus firewallD . Stateful firewallView AnswerAnswer: ABD
Which two options should you recommend?
A company receives over 1000 emails each day through the general alias [email protected]. The emails originate from all over the world, and include complaints and sales inquiries. Many emails relate to random topics. The company must be able to automatically categorize emails based upon the company location geographically closest to...
A Cisco ASA requires an additional feature license to enable which feature?
A Cisco ASA requires an additional feature license to enable which feature?A . transparent firewallB . cut-thru proxyC . threat detectionD . botnet traffic filteringE . TCP normalizerView AnswerAnswer: D
Which of the following error sub-codes can be contained in this OPEN message?
A Notification message with Error Code 2 indicates an error OPEN message. Which of the following error sub-codes can be contained in this OPEN message?A . 1: indicates that the version number is not supported.B . 2: indicates that the AS of the peer is incorrect.C . 3: indicates that...
What is this example of?
Employees are allowed access to internal websites. An employee connects to an internal website and IDS reports it as malicious behavior. What is this example of?A . true positiveB . false negativeC . false positiveD . true negativeView AnswerAnswer: C
Which of the following tools would be MOST useful in this scenario?
An administrator is troubleshooting analog telephony issues on the punch down block. Which of the following tools would be MOST useful in this scenario?A . T1 loopbackB . Butt setC . MultimeterD . Protocol analyzerView AnswerAnswer: B
Referring to the exhibit, which command would you use to add an additional address to the ge-0/0/9.0 interface?
-- Exhibit -- interfaces { ge-0/0/8 { unit 0 { family inet { address 192.168.1.1/24; } } } ge-0/0/9 { unit 0 { family inet { address 192.168.10.1/24; } } } } -- Exhibit -- Referring to the exhibit, which command would you use to add an additional address to...