What should you do?

You have a DHCP server named Server1 that runs Windows Server 2016. You have a single IP subnet. Server1 has an IPv4 scope named Scope1. Scope1 has an IP address range of 10.0.1.10 to 10.0.1.200 and a length of 24 bits. You need to create a second logical IP network...

May 13, 2018 No Comments READ MORE +

Which feature should be used to allow limited access?

A company has hired an entry-level network administrator for its new data center. The company CIO wants to give the administrator limited access on the newly configured Cisco Nexus 7000. Which feature should be used to allow limited access?A . NACB . VDCC . RBACD . vPCView AnswerAnswer: C

May 13, 2018 No Comments READ MORE +

Which two services define cloud networks? (Choose two.)

Which two services define cloud networks? (Choose two.)A . Infrastructure as a ServiceB . Platform as a ServiceC . Security as a ServiceD . Compute as a ServiceE . Tenancy as a ServiceView AnswerAnswer: A,B

May 13, 2018 No Comments READ MORE +

Which audience type does this group member belong to?

You are proposing a solution to a group that conflicts with a competing intiative of one of the group members. Which audience type does this group member belong to?A . CriticalB . HostileC . UninformedD . sympatheticView AnswerAnswer: B Explanation: Audience Types The assessment of different audience types helps to...

May 13, 2018 No Comments READ MORE +

What do subordinate switches in a switch stack keep?

What do subordinate switches in a switch stack keep?A . Subordinate switches keep their own spanning trees for each VLAN that they support.B . Subordinate switches keep entire VLAN databaseC . Store running config all the switchesView AnswerAnswer: A

May 13, 2018 No Comments READ MORE +

Which of these solutions would you recommend?

You currently operate a web application In the AWS US-East region The application runs on an autoscaled layer of EC2 instances and an RDS Multi-AZ database Your IT security compliance officer has tasked you to develop a reliable and durable logging solution to track changes made to your EC2.1AM And RDS resources. The solution...

May 13, 2018 No Comments READ MORE +

An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity?

An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity?A . The switch could offer fake DHCP addresses.B . The switch could become the root bridge.C . The switch could be allowed to join the VTP domain.D . The...

May 13, 2018 No Comments READ MORE +

What should you do?

A user has a laptop named Computer 1 that runs Windows 10 and has a 64-bit application named App1 installed. App1 fails to launch and generates an error message indicating that the application is not supported on this version of Windows. You need to ensure that App1 can run successfully....

May 13, 2018 No Comments READ MORE +

Which interface is used for vPC keepalives on both 7000's

Which interface is used for vPC keepalives on both 7000'sA . Port-channel 1B . Port-channel 2C . Port-channel 100D . Mgmt0E . Ethernet 2/1F . Ethernet 2/3View AnswerAnswer: D

May 13, 2018 No Comments READ MORE +

Which solution should you implement?

You are the Office 365 administrator for your company. The company requests that you implement a document collaboration and social networking solution that meets the following requirements: Users must be able to join groups to receive project updates. Any user must be able to post an event. You need to...

May 13, 2018 No Comments READ MORE +