Enjoy 15% Discount With Coupon 15off

Monthly Archives - November 2019

Which of the following is the expected FortiGate behavior regarding these two routes to the same destination?

Examine the two static routes shown in the exhibit, then answer title following question. Which of the following is the expected FortiGate behavior regarding these two routes to the same destination?A . FortiGate will load balance all traffic across both routes.B . FortiGate will use the port1 route as the...

Read more...

A FortiGate is operating in NAT mode and configured with two virtual LAN (VLAN) sub interfaces added to the physical interface.

A FortiGate is operating in NAT mode and configured with two virtual LAN (VLAN) sub interfaces added to the physical interface. Which statements about the VLAN sub interfaces can have the same VLAND ID, only if they have IP addresses in different subnets.A . The two VLAN sub interfaces can...

Read more...

Which of the following settings should the administrator modify to increase server security?

An administrator is setting up a Windows terminal server. Which of the following settings should the administrator modify to increase server security? (Select two.)A . Change the default access portB . Enforce password complexityC . Put the terminal server into the router’s DMZD . Disable logon time restrictionsE . Block...

Read more...

When deploying virtual disks for a UnityVSA system, what is an EMC recommended Disk Provision Policy?

When deploying virtual disks for a UnityVSA system, what is an EMC recommended Disk Provision Policy?A . Thick Provision Eager ZeroedB . Thin ProvisionC . Thick ProvisionD . Thick Provision Lazy ZeroedView AnswerAnswer: A Explanation: EMC recommends the following settings for all virtual disks:

Read more...

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

Read more...

What two solutions can you use?

You want to allow all of your company's users to access the Internet without allowing other Web servers to collect the IP addresses of individual users. What two solutions can you use? (Choose two).A . Configure a proxy server to hide users' local IP addresses.B . Assign unique IP addresses...

Read more...