Your network contains an Active Directory domain called contoso.com. The domain contains a member server named Server1. Server1 runs Windows Server 2012 R2.
You enable the EventLog-Application event trace session.
You need to set the maximum size of the log file used by the trace session to 10 MB.
From which tab should you perform the configuration?
To answer, select the appropriate tab in the answer area.
Note: By default, logging stops only if you set an expiration date as part of the logging schedule. Using the options on the Stop Condition tab, you can configure the log file to stop automatically after a specified period of time, such as seven days, or when the log file is full (if you’ve set a maximum size limit).
An organization implements single sign-on (5SO) for use with Office 365 services.
You install an Active Directory Federation Services (AD FS) proxy server.
Users report that they are unable to authenticate.
You launch the Event Viewer and view the event information shown in the following screen shot:
You need to ensure that users can authenticate to Office 365.
What should you do?
A. Re-enter the credentials used to establish the trust.
B. Verify the federation server proxy is trusted by the federation service.
C. Re-install the Secure Sockets Layer (SSL) certificate for the federation service.
D. Verify network connectivity between the Federation Service Proxy and federation server.
Drag and Drop Question
You are the Office 365 administrator for your company.
You audit the Windows Azure Active Directory Rights Management configuration for the company.
You need to view a log of the recent administrative commands performed against the Microsoft Rights Management Service.
Which three Windows PowerShell cmdlets should you run in sequence? To answer, move the appropriate cmdlets from the list of actions to the answer area and arrange them in the correct order.
A company deploys an Office 365 tenant.
You must provide an administrator with the ability to manage company information in Office 365. You need to assign permissions to the administrator by following the principle of least privilege.
Which role should you assign?
A. Global administrator
B. Service administrator
C. Billing administrator
D. User management administrator
Which of the following Aruba controllers is able to provide IEEE 802.3af? (Choose two)
D. 6000 with M3
The Guest Provisioning user account has the ability to do which of the following?
A. Add a new employee to the internal database
B. Change the “look” and “feel” of the guest provisioning page
C. Change the available data fields on the guest provisioning page
D. Add a guest user to the internal database
E. Assign a Role to a guest account
Which of the following methods can be used as collectors for device profiling? (Choose 2)
A. OnGuard agent
B. Active Directory Attributes
C. ActiveSync Plugin
D. Username and Password
E. Client’s role on the controller
When you upgrade the BIOS firmware, what additional components will also require an upgrade on a Cisco UCS C220 M3 Series rack server?
A. The BIOS upgrade is independent and does not require any other upgrades.
B. When you upgrade the BIOS firmware, you must also upgrade the CIMC firmware to the same version or the server will not boot.
C. There is no action required.
D. An NX-OS upgrade is also required at the same time.
What information is needed to configure a Granite Edge in the Granite Core?
A. Granite Edge Identifier.
B. IP address of the Granite Edge.
C. Primary IP address of the Granite Edge.
D. Granite Edge IQN (iSCSI Qualified Name).
E. In-path IP address of Granite Edge.
Which Granite appliance feature would be used to implement disconnected operations? (Select 2)
C. High availability
Which two show commands will confirm that a device is receiving OSPF external routes? (Choose two.)
A. ip ospf database
B. ip route
C. ip ospf interface
D. ip ospf neighbors
Your developers have written a custom application that uses TCP over port 8080. The Brocade ADX is not passing the Health Checks to those real servers. The clients can reach the servers directly and the application is functional. What would you do to resolve this?
A. You can only use well known ports on the VIP facing the clients.
B. You need to configure no port 8080 translate on the real server.
C. You need to specify alias ports under the virtual server.
D. You need to specify TCP under the port profile.
Which OSPF router type connects two different areas?
Which three transceiver form factors are supported by Brocade switches and routers? (Choose three.)