What do you use to create VLANs
D. proxy server
Section Reference: Identifying Types of LANs
Explanation: Switches usually control the VLAN. Like subnetting, a VLAN compartmentalizes a network and can isolate traffic.
You have a Dynamics CRM organization.
You set an option that contains the values configured as shown in the following table.
What is the default sort order of the labels?
A. Four, One, Three, Two
B. Two, One, Three, Four
C. One, Two, Three, Four
D. Two, One, Four, Three
You need to recommend a method to deploy the images to the new client computers in the Paris office. What should you include in the recommendation?
A. a Configuration Manager secondary site
B. a Windows Deployment Services (WDS) server
C. a Windows To Go installation
D. a cloud distribution point
After you deploy the RegionalSales report, you attempt to configure the subscriptions.
You discover that the subscription creation screen does not display the option to deliver the report by email.
You need to ensure that subscriptions can be delivered by using email.
What should you do?
A. Modify the Rsmgrpolicy.config file.
B. From Central Administration, modify the SMTP settings of the SharePoint Server server farm.
C. Modify the Rssrvrpolicy.config file.
D. From Central Administration, modify the properties of the Reporting Service Application.
You are the newly appointed enterprise administrator at YourCompany.com. The YourCompany.com network consists of a single Active Directory domain named YourCompany.com.
YourCompany.com contains a client workstation named YourCompany-WS123 that is running Windows 7. A YourCompany.com user named Mia Hamm complained that she cannot log on to YourCompany-WS123. She received an error message indicating that YourCompany-WS123’s computer account in its primary domain is missing or the password on that account is incorrect. She was able to log on to the domain with YourCompany-WS123 last week. Which two of the following options will enable Mia Hamm to log on to the domain with YourCompany- WS123?
A. You should create a computer account named YourCompany-WS123 using Active Directory Users and Computers.
B. You should join YourCompany-WS123 to a workgroup.
C. You should join YourCompany-WS123 to the domain.
D. You should disable the computer account for YourCompany-WS123 using Active Directory Users and Computers.
E. You should enable the computer account for YourCompany-WS123 using Active Directory Users and Computers.
You have a computer named Computer1 that has the following four hard disk drives installed:
- Drive 1: A 500-GB OS volume
- Drive 2: A 400-GB data volume
- Drive3: A 400-GB empty volume
- Drive 4: A 500-GB empty volume
You need to create a two-way mirror by using Storage Spaces. The solution must minimize data loss. Which drives should you use?
A. Drive 1 and Drive 2
B. Drive 1 and Drive 4
C. Drive 2 and Drive 3
D. Drive 3 and Drive 4
A SQL Server Integration Services (SSIS) package on a computer is failing periodically in production. The package was created less than one year ago and was deployed to the SSIS catalog. Sometimes the package is started on a SQL Agent schedule; sometimes the package is started manually by an SSIS developer by using the Object Explorer in SQL Server Management Studio. You need to identify the authenticated user responsible for starting the package each time it failed in the past. Where can you find this information?
A. the SQL Server Log
B. the SSISDB.[catalog].[executions] view
C. the SSISDB.[catalog].[event_messages] view
D. the SQL Agent Job History
E. the SQL Agent Error Log
Which model users a central database for authentication?
What zone is used to publish external websites for an organization?