Enjoy 15% Discount With Coupon 15off

Monthly Archives - March 2020

When planning ‘continual improvement’, which approach for assessing the current state of a service is CORRECT?

When planning ‘continual improvement’, which approach for assessing the current state of a service is CORRECT?A . An organization should always use a single technique to ensure metrics are consistentB . An organization should always use a strength, weakness, opportunity and threat (SWOT) analysisC . An organization should always develop...

Read more...

Which two settings need to be configured to allow a user to move content from Admin Repository A to Admin Repository B in the VMware Content Locker? (Choose two.)

Which two settings need to be configured to allow a user to move content from Admin Repository A to Admin Repository B in the VMware Content Locker? (Choose two.)A . Admin Repository A needs Allow Savings to Other Repositories enabledB . Local storage needs to be enabled for VMware Content...

Read more...

Which two telecom data settings can be enabled and collected by an administrator? (Choose two.)

Which two telecom data settings can be enabled and collected by an administrator? (Choose two.)A . Websites visited while using cellular dataB . The cellular data use in terms of total bytes sent and receivedC . The total voice minutes used for all cellular callsD . The telephone numbers dialed...

Read more...

Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)

Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)A . SIPB . inline normalizationC . SSLD . packet decoderE . modbusView AnswerAnswer: AC Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config­guide-v60/Application_Layer_Preprocessors.html

Read more...

When evaluating the ability of a disaster recovery plan to enable the recovery of IT processing capabilities, it is MOST important for the IS auditor to verify the plan is:

When evaluating the ability of a disaster recovery plan to enable the recovery of IT processing capabilities, it is MOST important for the IS auditor to verify the plan is:A . stored at an offsite locationB . communicated to department headsC . regularly reviewedD . periodically testedView AnswerAnswer: C

Read more...

To address the issue that performance pressures on IT may conflict with information security controls, it is MOST important that:

To address the issue that performance pressures on IT may conflict with information security controls, it is MOST important that:A . the security policy is changed to accommodate IT performance pressureB . noncompliance issues are reported senior managementC . senior management provides guidance and dispute resolutionD . information security management...

Read more...