For optimized encrypted MAPI, is the inner channel encrypted by default?
For optimized encrypted MAPI, is the inner channel encrypted by default?A . Yes, alwaysB . NoC . Only for MS Exchange 2003 and laterD . Yes, but this is configured on the serverView AnswerAnswer: B Explanation: Reference: https://support.riverbed.com/bin/support/static/d6j3tb1i55ni1erbjp6e3fln9v/html/mhmppa9t9gq3laicvt0r91b1n7/sh_cx_9.2_ug_html/index.html#page/sh_cx_9.2_ug/setupServiceProtocolsMAPI.html
Which SteelHead appliance deployment mode uses the Primary interface for optimization?
Which SteelHead appliance deployment mode uses the Primary interface for optimization?A . Virtual in-pathB . Physical in-pathC . Serial ClusterD . Server-Side Out of Path (SSOOP)E . InterceptorView AnswerAnswer: E
Which statement is true about NFS optimization?
Which statement is true about NFS optimization?A . NFS cannot be optimized due to its proprietary encryption mechanismB . All NFS is optimized with both bandwidth and latencyC . NFS v2 & v4 can be optimized with bandwidth only, v3 can attain both bandwidth & latencyD . NFS can only...
What is the benefit of configuring Datastore Sync between SteelHeads?
What is the benefit of configuring Datastore Sync between SteelHeads?A . It allows up to four SteelHeads in a cluster access to the same datastoreB . It gives high availability to the warm data patterns in exactly two SteelHeadsC . It allows for seamless transition when upgrading to a larger...
What is the purpose of creating an account in Active Directory with Replication User privilege for the use of the SteelHeads?
What is the purpose of creating an account in Active Directory with Replication User privilege for the use of the SteelHeads?A . It allows SteelHeads to authenticate users on behalf of the Domain ControllersB . It allows SteelHeads the ability to automatically run backups to a SMB file share within...
In which type of computing does the cloud provider provide users with the platform and environment to develop, manage, and run applications over the Internet?
In which type of computing does the cloud provider provide users with the platform and environment to develop, manage, and run applications over the Internet?A . IaaSB . PaaSC . SaaSD . YaaSView AnswerAnswer: C Explanation: Reference: https://rubygarage.org/blog/iaas-vs-paas-vs-saas
In which of the following Transparency Modes do the Client and Server retain their own IP addressing across the WAN?
In which of the following Transparency Modes do the Client and Server retain their own IP addressing across the WAN?A . Correct AddressingB . Port TransparencyC . Full TransparencyD . All of the aboveView AnswerAnswer: C Explanation: Reference: https://support.riverbed.com/bin/support/static/17qudtqont75l258qrbn4maj75/html/1mk0rjev5snblam40lgbg0mrgp/sh_9.5_dg_html/index.html#page/sh_9.5_dg/network_trans.html
Which report displays the rate of established SSL connections?
Which report displays the rate of established SSL connections?A . WAN ThroughputB . Traffic SummaryC . SSLD . Current ConnectionsView AnswerAnswer: C Explanation: Reference: https://support.riverbed.com/bin/support/static/d6j3tb1i55ni1erbjp6e3fln9v/html/mhmppa9t9gq3laicvt0r91b1n7/sh_cx_9.2_ug_html/index.html#page/sh_cx_9.2_ug/reportSSLStatistics.html
In a Quad Interceptor deployment with two paths, what are the correct settings to configure for High Availability?
In a Quad Interceptor deployment with two paths, what are the correct settings to configure for High Availability?A . Fail-to-wire and allow neighbour failureB . Fail-to-wire and do not allow neighbour failureC . Fail-to-block and allow neighbour failureD . Fail-to-block and do not allow neighbour failureView AnswerAnswer: B
In virtual in-path deployments, such as PBR, what is never used?
In virtual in-path deployments, such as PBR, what is never used?A . Subnet-side rulesB . A fake SNMP if-indexC . LAN interfaceD . WAN interfaceView AnswerAnswer: B Explanation: Reference: https://support.riverbed.com/bin/support/static/fbunsuuo632vi3jrspe0evbko9/html/u2pi6l52l4drmhq3uhck9tu7hm/sh_9.2_dg_html/index.html#page/sh_9.2_dg/logical_inpath.html