Which switch would STP choose to become the root bridge in the selection process?

Which switch would STP choose to become the root bridge in the selection process?A . 32768: 11-22-33-44-55-66B . 32768: 22-33-44-55-66-77C . 32769: 11-22-33-44-55-65D . 32769: 22-33-44-55-66-78View AnswerAnswer: A

May 18, 2018 No Comments READ MORE +

Which two actions will achieve the goal?

You manage an application running on Azure web apps in a Standard tier. The application uses a substantial amount of large image files from a storage account and is used by people around the world. Users from Europe report that the load time of the site is slow. You need...

May 18, 2018 No Comments READ MORE +

Which command-line tool should you use?

You are developing an ASP.NET MVC application that will be deployed on a web farm. Passwords must be stored in the web.config file and must not be readable or in a format that is easily decodable You need to encrypt the passwords that are stored in the web.config file. Which...

May 18, 2018 No Comments READ MORE +

Which configuration causes RIP-learned routes to be advertised to other RIP neighbors?

Which configuration causes RIP-learned routes to be advertised to other RIP neighbors?A . set protocol rip no-passiveB . top edit policy-options policy-statement demo set term 1 from protocol rip set term 1 then accept top set protocols rip group internal export demoC . set protocols rip advertise in-outD . top...

May 18, 2018 No Comments READ MORE +

Which one of these could you implement to sustain a large DDoS attack?

Which one of these could you implement to sustain a large DDoS attack?A . Stateful firewallB . uRPFC . Connections limits and timeoutsD . Access-listsView AnswerAnswer: C

May 18, 2018 No Comments READ MORE +

Which interface card should be configured when Huawei OceanStor 5600 V3 storage inter-engine interconnection expansion?

Which interface card should be configured when Huawei OceanStor 5600 V3 storage inter-engine interconnection expansion?A . PCIEB . 10 GEC . IBD . SmartIOView AnswerAnswer: D

May 18, 2018 No Comments READ MORE +

Which command creates a login authentication method named "login" that will primarily use RADIUS and fail over to the local user database?

Which command creates a login authentication method named "login" that will primarily use RADIUS and fail over to the local user database?A . (config)# aaa authentication login default radius localB . (config)# aaa authentication login login radius localC . (config)# aaa authentication login default local radiusD . (config)# aaa authentication...

May 18, 2018 No Comments READ MORE +

What is the output of the following code?

What is the output of the following code? class A { public $a= 1; public function _construct($a) { $this->a = $a; } public function mul() { } return function($x) { return $this->a*$x; }; $a= new A(2); $a->mul = function($x) { return $x*$x; }; $m = $a->mul(); echo $m(3);A . 9B...

May 18, 2018 No Comments READ MORE +

Which two statements are true regarding rescue configurations? (Choose two.)

Which two statements are true regarding rescue configurations? (Choose two.)A . Once saved, a rescue configuration is loaded using the rollback 0 command.B . The rescue configuration must contain the minimal elements necessary to restore network connectivity.C . A minimal rescue configuration is defined by default.D . A rescue configuration...

May 18, 2018 No Comments READ MORE +

Which two encryption keys does the host use when encrypting virtual machine files? (Choose two.)

Which two encryption keys does the host use when encrypting virtual machine files? (Choose two.)A . Public Key Infrastructure Encryption Key (PKI)B . Master Encryption Key (MEK)C . Data Encryption Key (DEK)D . Key Encryption Key (KEK)View AnswerAnswer: C,D

May 18, 2018 No Comments READ MORE +