QUESTION 1 Which two actions must an administrator take before deleting a vApp network? (Choose two) A. Disconnect the vShield Edge device. B. Shut down all VMs within the vApp. C. Shut down all connected VMs. D. Disconnect all connected VMs. Answer: CD
QUESTION 1 Which of the following ports support hot swapping? Each correct answer represents a complete solution. Choose two. A. Parallel B. Serial C. IEEE 1394 D. USB Answer: D and C
QUESTION 1 A small business currently has four separate servers, three of which perform low-overhead tasks with small memory footprints. How could the company BEST reduce power consumption among these four servers, while not sacrificing functionality? A. Enable each server’s Cool ‘n’ Quiet and/orSpeedStep functionality so that processing power is conserved. B. Enforce auto-shutdown routines […]
QUESTION 1 Which of the following is NOT a parallel port mode? A. EPP/ECP B. ECP C. EPS D. EPP Answer: C
QUESTION 1 You are working with a team that will be bringing in new computers to a sales department at a company. The sales team would like to keep not only their old files, but system settings as well on the new PC’s. What should you do? A. Do a system backup (complete) on each […]
QUESTION 1 Which of the following tools allows an administrator to determine the MAC address of another computer? A. ping B. arp C. ifconfig D. ipconfig Answer: B
QUESTION 1 Which of the following items are valid placements for an MDM solution? (Select TWO). A. SaaS B. Cellular tower C. Access point D. On-premise E. Hotspots Answer: AD
QUESTION 1 A zone data collector ___________ . (Choose the correct option to complete the sentence.) A. handles ICA traffic for the zone B. writes information to the data store C. is responsible for maintaining server load evaluator information D. makes sure all XML traffic is routed between the servers in the zone Answer: C
QUESTION 1 What is the role of the pool management service? A. Clones virtual machines B. Turns virtual machines on and off C. Streams the virtual machine to the users D. Assigns users to the correct virtual machine Answer: B
QUESTION 1 Scenario: Nether Tech Inc. is planning to implement Provisioning Services for deployment of images to their XenApp servers and XenDesktop workstations. The architect has created the design for the Provisioning Services environment, making the following design decisions for the Provisioning Services environment: One Provisioning Services farm will be created: PVSFARM. Two Provisioning Services […]
QUESTION 1 What is a risk analysis used for? A. A risk analysis is used to express the value of information for an organization in monetary terms. B. A risk analysis is used to clarify to management their responsibilities. C. A risk analysis is used in conjunction with security measures to reduce risks to an […]
QUESTION 1 Which of the following are reasons that Home Working can reduce your carbon footprint? a) It reduces the travel needed to attend meetings. b) It reduces the paperwork needed for meetings. c) It reduces the space needed within the office. d) It reduces the power consumed during meetings. A. b and c only. […]
QUESTION 1 What is the significance of classifying applications for data availability requirements? A. Identify an application’s non-functional requirements B. Identify an application’s functional requirements C. Determine application mapping with critical components D. Determine business continuity priorities Answer: D
QUESTION 1 You are planning to deploy a virtualized application in a high-availability configuration with automated VM restart on a hypervisor cluster. Your sizing estimates show that peak workload conditions will saturate the processing power of four hypervisor servers. To meet the SLA, N+2 redundancy is required on the hypervisor servers, with server utilization not […]
QUESTION 1 During the presentation of a prototype, a customer realizes that it has left out a critical security component. The customer has already approved the software requirements. What is the appropriate next step for the consultant? A. Ask the customer for a change request form. B. Agree to make the changes needed at no […]