Which attack can be prevented by OSPF authentication?
Which attack can be prevented by OSPF authentication?A . IP spoofing attackB . smurf attackC . denial of service attackD . buffer overflow attackView AnswerAnswer: A
Which attack can be prevented by OSPF authentication?A . IP spoofing attackB . smurf attackC . denial of service attackD . buffer overflow attackView AnswerAnswer: A
A project team is mainly based in a metropolitan area. The team also has members in a remote area, where Internet access is limited and unstable. Which of the following factors will MOST likely influence the communication methods used in the project?A . Personal preferencesB . Technological factorsC . Language...
When used with KVM, which of the following block device image formats support snapshots?A . qcowB . dmgC . qedD . qcow2E . rawView AnswerAnswer: D
SIMULATION Project 2 of 7: Bakery Letter Overview As the marketing manager for Liberty’s Delightful Sinful Bakery and Café, you want to inform local businesses that you will now be providing catering services. December 31, 2018 CATERING SERVICES ARE NOW AVAILABLE Dear Business Owner: Liberty’s Delightful Sinful Bakery and Café...
A customer wishes to deploy a new application on VMware Cloud on AWS. This application will consist of several web servers and application servers. The data on the application services needs to be backed up regularly and backups must be stored outside the SDDC to meet compliance. The backup solution...
Who in the organization determines access to information?A . Compliance officerB . Legal departmentC . Data OwnerD . Information security officerView AnswerAnswer: C
You have 20 servers that run Windows Server 2012 R2. You need to create a Windows PowerShell script that registers each server in Microsoft Azure Backup and sets an encryption passphrase. Which two PowerShell cmdlets should you run in the script? (Each correct answer presents part of the solution. Choose...
Which Native AWS construct are third-party ISV partners able to leverage for data archiving within the data-protection service?A . AthenaB . GlacierC . KinesisD . CognitoView AnswerAnswer: B Explanation: data-processing application on Amazon EC2 and uses Amazon S3 and Amazon S3 Glacier
Which type of malicious software can create a back-door into a device or network?A . TrojanB . botC . wormD . virusView AnswerAnswer: A
The firewall is not downloading IP addresses from MineMeld. Based, on the image, what most likely is wrong?A . A Certificate Profile that contains the client certificate needs to be selected.B . The source address supports only files hosted with an ftp://<address/file>.C . External Dynamic Lists do not support SSL...