Question 6
A company's data center is hosted at its corporate office to ensure greater control over the security of sensitive dat a. During times when there are increased workloads, some of the company's non-sensitive data is shifted to an external cloud provider. Which of the following cloud deployment models does this describe?
Question 7
A company just migrated its email service to a cloud solution. After the migration, two-thirds of the internal users were able to connect to their mailboxes, but the connection fails for the other one-third of internal users. Users working externally are not reporting any issues. The network administrator identifies the following output collected from an internal host:
c:\user> nslookup newmail.company.com
Non-Authoritative answer:
Name: newmail.company.com
IPs: 3.219.13.186, 64.58.225.184, 184.168.131.243
Which of the following verification tasks should the network administrator perform NEXT?
c:\user> nslookup newmail.company.com
Non-Authoritative answer:
Name: newmail.company.com
IPs: 3.219.13.186, 64.58.225.184, 184.168.131.243
Which of the following verification tasks should the network administrator perform NEXT?
Question 8
Which of the following systems would MOST likely be found in a screened subnet?
Question 9
Which of the following would be used to expedite MX record updates to authoritative NSs?
Question 10
Which of the following TCP ports is used by the Windows OS for file sharing?