18

SENIOR SYSTEMS / NETWORK ENGINEER QUIZ

 

Please read the following instructions carefully before beginning the exam.

 

  • You will be permitted to take the examination just once.
  • Read the question carefully and respond appropriately, since you will not be allowed to revise your previous responses.
  • If you take an excessive amount of time, the session will expire. The system anticipates around 30 minutes to finish the questions.
  • If your computer is inactive for an extended period of time, the session will expire.

 

Please click the 'Start' button after entering the password.

The number of attempts remaining is 3

1 / 52

Please enter your name

2 / 52

Please enter your email address

3 / 52

How do you register a user control in Azure?

4 / 52

Which of the following is not a Windows Azure service?

5 / 52

What is the existence of weakness in a system or network is known as?

6 / 52

Which of the following is not a type of peer-to-peer cyber-crime?

7 / 52

Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?

8 / 52

Which of the following is not a cybercrime?

9 / 52

What is the TCP port on the server recommended for client SMTP connections?

10 / 52

An Office 365 administrator wants to allow users to publish their calendars online. What do they need to do in Exchange Online?

11 / 52

What Exchange Management Shell cmdlet do you use to get the TXT string you need to enter into public DNS for a federation trust if you have closed the Federation Trust Wizard?

12 / 52

Which among the following is used to write small programs to control Unix functionalities?

13 / 52

Which of the following statement is FALSE ?

14 / 52

When the return value of any function is not specified within the function, what function returns?

15 / 52

Which of the following is a web service that manages the memory cache in the cloud?

16 / 52

Which of the following is not used for load balancing?

17 / 52

What are key-pairs in AWS?

18 / 52

EC2 Machine types define which of the following?

19 / 52

Which of the following services are free in AWS?

20 / 52

A Citrix Administrator needs to retrieve a license from a user who has left the organization. Which command should the administrator execute on the License Server to complete this task without retrieving licenses from other users?

21 / 52

A Citrix Administrator is given the task of creating a new maintenance version for a vDisk from an existing maintenance disk. Which task does the administrator need to complete before the new maintenance version of the vDisk is created?

22 / 52

Scenario: A Citrix Administrator uses Citrix Director to determine that user logon times have increased by two minutes in
the last three months. The administrator wants to resolve this issue before the delay further impacts users. Which action
could the administrator take to reduce the logon times?

23 / 52

Scenario: When remote users attempt to log on through NetScaler Gateway, they are presented with the following error
message:
\'Cannot Complete your Request.\'
When the same users are in the office, they are able to log on successfully. What should a Citrix Administrator change
to resolve this issue?

24 / 52

Where in Citrix Director could a Citrix Administrator validate that Flash Redirection is enabled?

25 / 52

What protocol is used by an ESXi host to communicate with NAS devices?

26 / 52

By default, where do hosts deployed with VMware Auto Deploy store logs?

27 / 52

You have been asked to provide high availability for your vCenter server. Which product would you use to help achieve this?

28 / 52

When is vNUMA enable by default on a virtual machines?

29 / 52

Which of the following installation methods installs the ESXi image directly into the Host memory?

30 / 52

What are the 4 VM Restart Priority options available on an HA Cluster?

31 / 52

What is the name of the globally unique identifier assigned to each Fibre Channel Port?

32 / 52

To get the maximum performance benefits of vNUMA it is recommended to:

33 / 52

Your colleague has accidentally allocated more vRAM than your company are licensed for. What will happen to your virtual machines?

34 / 52

Your boss has asked you to setup 4 ESXi hosts to evaluate the new vSphere 5 release, which is the recommended install method to use in this situation?

35 / 52

A customer is connecting toa Cisco IOS XR PE device via BGP. The peering session is up and the customer is advertising routes, but the provider is not receiving any. Which issue is the most likely cause?

36 / 52

What is an advantage of using the Cisco EVC infrastructure to implement carrier-class Ethernet services that are not available on non-EVC-capable platforms?

37 / 52

Which flavor of MPLS Layer 3 VPN has MPLS enabled on PE-CE links?

38 / 52

When using MPLS and OSPF, the PE routers function as what?

39 / 52

Which statement about using MPLS and dynamic routing protocols is true?

40 / 52

You have been asked to recommend a private WAN technology. All of the remote offices have varied physical connectivity paths. Which private WAN technology should you recommend?

41 / 52

Which routing protocol do MPLS providers typically use internally in the provider’s network?

42 / 52

What should you do if you are looking at a strategic win with a customer and the customer wants to examine Cisco ISE for longer than a few weeks?

43 / 52

Which Cisco product supports SD-Access and is specifically built to address new challenges faced by enterprises?

44 / 52

Which element of the Cisco SD-WAN architecture facilitates the functions of controller discovery and NAT traversal?

45 / 52

For device identification and authentication, the authentication between devices and connections to networks is an example of a(n):

46 / 52

Which of this is not a constituent of residential telephone line?

47 / 52

What is the maximum volume size that Azure Backup can protect?

48 / 52

Which Azure PowerShell cmdlet should you use to change the size of a virtual machine?

49 / 52

You create a virtual machine named vm1 in cloudservice1, and vm2 in cloudservice2. You have added a load balanced endpoint on vm1 but the management portal does not show the load-balanced set on vm2. What is the problem in Azure?

50 / 52

Which Azure PowerShell cmdlet should you use to upload a virtual hard disk file?

51 / 52

How many virtual machines can be deployed into a cloud service in Azure?

52 / 52

What is the maximum size for a Page Blob in Azure?

CONTACT US

We're not around right now. But you can send us an email and we'll get back to you, asap.

Sending

  Privacy Policy & Secure | ©2024 capsicumlabs.com

Log in with your credentials

Forgot your details?