Enjoy 15% Discount With Coupon 15off

Monthly Archives - December 2020

What should you do?

You deploy Enterprise Mobility + Security E5 and assign Microsoft 365 licenses to all employees. Employees must not be able to share documents at forward emails that contain sensitive information outside the company. You need to enforce the file sharing restrictions. What should you do?A . Use Microsoft Azure Information...

Read more...

What is the primary mechanism in Cisco Unity Connection that is used for toll fraud prevention?

What is the primary mechanism in Cisco Unity Connection that is used for toll fraud prevention?A . restriction tablesB . fraud tablesC . transfer rulesD . calling search spacesView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/connection/10x/security/guide/10xcucsecx/10xcucsec020.pdf

Read more...

Which three actions should you perform?

You have an azure subscription that contain a virtual network named VNet1. VNet1 contains four subnets named Gateway, perimeter, NVA, and production. The NVA contain two network virtual appliance (NVAs) that will do network traffic inspection between the perimeter subnet and the production subnet. You need to implement an Azure...

Read more...

CORRECT TEXT

CORRECT TEXT You need to ensure that connections from the Internet to VNET1subnet0 are allowed only over TCP port 7777. The solution must use only currently deployed resources. To complete this task, sign in to the Azure portal.View AnswerAnswer: You need to configure the Network Security Group that is associated...

Read more...

You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table

HOTSPOT You have an Azure Active Directory (Azure AD) tenant named contoso.com that contains the users shown in the following table. Azure AD Privileged Identity Management (PIM) is enabled for the tenant. In PIM, the Password Administrator role has the following settings: • Maximum activation duration (hours): 2 • Send...

Read more...

In the Fusioninsight HD product, what is wrong about the Kafka secure and non-secure port description?

In the Fusioninsight HD product, what is wrong about the Kafka secure and non-secure port description? (Note: The old API refers to the old Producer API and the old Consumer API. Among them, the old Consumer API: refers to the interface defined in kafka.consumer.ConsumerConnector; the old Producer API: refers to...

Read more...