Enjoy 15% Discount With Coupon 15off

Yearly Archives - 2019

Which tool can an attacker use to attempt a DDoS attack?

Which tool can an attacker use to attempt a DDoS attack?A . botnetB . Trojan horseC . virusD . adwareView AnswerAnswer: A Explanation: Denial-of-service (DoS) attack and distributed denial-of-service (DDoS) attack. An example is using a botnet to attack a target system. Source: Cisco Official Certification Guide, Table 1-6 Additional...

Read more...

What projection should be used?

An ArcGIS user is preparing data for an aeronautical chart where the bearings and shapes of the features, such as coastline, need to be maintained for visual orientation. What projection should be used?A . Albers Equal AreaB . Equidistant CylindricalC . Azimuthal EquidistantD . Lambert Conformal ConicView AnswerAnswer: C Explanation:...

Read more...

When you connect an internal switch to an upstream provider switch, which feature is most appropriate to implement to avoid potential broadcast storms?

When you connect an internal switch to an upstream provider switch, which feature is most appropriate to implement to avoid potential broadcast storms?A . BPDU filterB . BPDU ignoreC . loop guardD . BPDU guardE . flex linksView AnswerAnswer: A

Read more...

What is an example of agility in the AWS Cloud?

What is an example of agility in the AWS Cloud?A . Access to multiple instance typesB . Access to managed servicesC . Using Consolidated Billing to produce one billD . Decreased acquisition time for new compute resourcesView AnswerAnswer: D Explanation: Reference: https://aws.amazon.com/blogs/enterprise-strategy/risk-is-lack-of-agility/

Read more...