QUESTION 21 You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of an Active Directory domain. Windows Remote Management (WinRM) is enabled on both computers. You need to remotely create additional disk volumes on Computer1 from Computer2. What should you do? A. On Computer2, run Winrs and then […]
QUESTION 11 You have a portable computer that runs Windows 7. You configure the computer to enter sleep mode after 10 minutes of inactivity. You do not use the computer for 15 minutes and discover that the computer has not entered sleep mode. You need to identify what is preventing the computer from entering sleep […]
QUESTION 1 You have a computer that runs Windows 7. The computer has System Protection enabled. You need to retain only the last System Protection snapshot of the computer. All other snapshots must be deleted. What should you do? A. Run Disk Cleanup for Programs and features. B. Run Disk Cleanup for System Restore and […]
QUESTION 7 Drag and Drop Question You create work items to test the features of an application. Match each work item type to its description. To answer, drag the appropriate work item type from the column on the left to its description on the right. Each work item type may be used once, more than […]
QUESTION 1 When you log a bug, which two items should you include in the bug report to reproduce the bug? (Choose two.) A. The actions leading up to the bug B. The author of the code C. A description of the actual results D. The severity of bug Answer: AB QUESTION 2 Hotspot Question […]
QUESTION 1 You want to add a new CDC subscriber in ODI after you have started the Journal process, what steps do you need to go through in order to use this new subscriber? A. Drop Journal, remove existing subscribers, add a new subscriber, start Journal, and edit the default Journalizing filter in your Interfaces […]
QUESTION 1 Which of the following protocols operates at the HIGHEST level of the OSI model? A. ICMP B. IPSec C. SCP D. TCP Answer: C QUESTION 2 Which of the following should an administrator implement to research current attack methodologies? A. Design reviews B. Honeypot C. Vulnerability scanner D. Code reviews Answer: B QUESTION […]
QUESTION 1 What is the result of the following bitwise operation in PHP? 1 ^ 2 A. 1 B. 3 C. 2 D. 4 E. -1 Answer: B QUESTION 2 What is the output of the following code? echo “22” + “0.2”, 23 . 1; A. 220.2231 B. 22.2231 C. 22.2,231 D. 56.2 Answer: B […]
QUESTION 11 Which piece of code will return the ASCII value of a character? A. (int)’t’; B. ord(‘t’); C. to_ascii(‘t’); D. chr(‘t’); Answer: B QUESTION 12 Which of the following data types cannot be directly manipulated by the client? A. Cookie Data B. Session Data C. Remote IP Address D. User Agent Answer: B QUESTION […]
QUESTION 1 Which of the following can be registered as entry points with a SoapServer instance (choose 3) A. A single function B. A single method from a class C. Multiple functions at once D. All methods from a class E. All classes defined in a script Answer: ACD QUESTION 2 What DOMElement method should […]
QUESTION 1 Which Layer 2 mechanism should be used to authenticate wireless or wired users before allowing them access to network resources? A. 802.1X B. MIMO C. 802.1Z D. WPA Answer: A QUESTION 2 Which HP switch supports nine switches in an IRF topology? A. 5120-SI B. 9 5820 C. 7500 D. 12500 Answer: B […]
QUESTION 1 HP Intelligent Management Centers (IMC’s) Intelligent Configuration Center and Access Control List (ACL) Manager align with which FCAPS category? A. Performance B. Fault C. Accounting D. Configuration Answer: B QUESTION 2 A customer wants to implement a network access control solution to ensure that only devices which meet company policies are allowed to […]
QUESTION 71Your company has three data centers. The data centers are located in Montreal, New York, and Seattle.You have an Exchange Server 2013 organization that contains six servers. The servers are configured as shown in the following table. The organization is configured as shown in the following exhibit. (Click the Exhibit button.) The file share witness for […]
QUESTION 61Drag and Drop QuestionYou have an Exchange Server organization named adatum.com. The organization contains servers that have Exchange Server 2010 and Exchange Server 2013 installed.The company executives require that all email messages remain stored for three years.You create two retention tags named Ret1 and Ret2. Ret1 moves the email messages to an Archive mailbox […]
QUESTION 51Drag and Drop QuestionYou have an Exchange Server 2013 database availability group (DAG). Each member of the DAG has two network interfaces named Network1 and Network2. Network1 is used for client connections. Network2 is used for database replication.Network2 fails.You discover that replication traffic is sent over Network1.You need to ensure that all of the […]