Enjoy 15% Discount With Coupon 15off

Monthly Archives - May 2020

What principle is this?

GDPR quotes in one of its principles that personal data should be adequate, relevant and limited to what is necessary in relation to its purpose. What principle is this?A . integrity and confidentialityB . purpose limitationC . data minimizationD . lawfulness, loyalty and transparencyView AnswerAnswer: C Explanation: In its Article...

Read more...

In stretched clusters, what is a benefit of implementing a virtual witness rather than a physical witness?

In stretched clusters, what is a benefit of implementing a virtual witness rather than a physical witness?A . Reduced vSphere licensingB . Shared metadata between separate clustersC . Increased vSAN datastore capacityD . Increased compute for running VMsView AnswerAnswer: A Explanation: Reference: https://cormachogan.com/2015/09/11/a-closer-look-at-the-vsan-witness-appliance/

Read more...

Drag and drop the code to complete the script to search Cisco ThreatGRID and return all public submission records associated with cisco.com. Not all options are used

DRAG DROP Drag and drop the code to complete the script to search Cisco ThreatGRID and return all public submission records associated with cisco.com. Not all options are used. View AnswerAnswer: Explanation: Reference: https://community.cisco.com/t5/endpoint-security/amp-threat-grid-api/m-p/3538319

Read more...

Which virtual machines can you migrate?

HOTSPOT You have an Azure subscription named Subscription1. You have a virtualization environment that contains the virtualization servers in the following table. The virtual machines are configured as shown in the following table. All the virtual machines use basic disks. VM1 is protected by using BitLocker Drive Encryption (BitLocker). You...

Read more...

A 3-node vSAN cluster will take which two actions, when a drive is physically removed from a vSAN node? (Choose two.)

A 3-node vSAN cluster will take which two actions, when a drive is physically removed from a vSAN node? (Choose two.)A . Marks all components on that device as absentB . Marks all components on that device as degradedC . Waits for the configured delay timer before rebuildD . Marks...

Read more...

Which two authentication methods should you use?

You are implementing authentication for applications in your company. You plan to implement self-service password reset (SSPR) and multifactor authentication (MFA) in Azure Active Directory (Azure AD). You need to select authentication mechanisms that can be used for both MFA and SSPR. Which two authentication methods should you use? Each...

Read more...