Enjoy 15% Discount With Coupon 15off

Monthly Archives - May 2021

Under what circumstances would the GDPR apply to personal data that exists in physical form, such as information contained in notebooks or hard copy files?

Under what circumstances would the GDPR apply to personal data that exists in physical form, such as information contained in notebooks or hard copy files?A . Only where the personal data is produced as a physical output of specific automated processing activities, such as printing, labelling, or stamping.B . Only...

Read more...

Which two settings should you configure in Endpoint protection?

HOTSPOT You have 200 computers that run Windows 10. The computers are joined to Microsoft Azure Active Directory (Azure AD) and enrolled in Microsoft Intune. You need to configure an Intune device configuration profile to meet the following requirements: ✑ Prevent Microsoft Office applications from launching child processes. ✑ Block...

Read more...

This high-level requirements list is also known as what term?

When using a change-driven approach, the business analyst may create an initial list of high-level requirements for the initiative. This high-level requirements list is also known as what term?A . Requirements envisioningB . Project scopeC . Product scopeD . Requirements foundationView AnswerAnswer: A Explanation: The initial high-level listing of requirements...

Read more...

Drag and Drop Question

Drag and Drop Question Drag and drop the packet types from the left on to the correct descriptions on the right. View AnswerAnswer: Explanation: Unlike legacy network technologies such as ISDN, Frame Relay, and ATM that defined separate data and control channels, IP carries all packets within a single pipe....

Read more...

How should you model the employee data?

You need to design an Azure Synapse Analytics dedicated SQL pool that meets the following requirements: ✑ Can return an employee record from a given point in time. ✑ Maintains the latest employee information. ✑ Minimizes query complexity. How should you model the employee data?A . as a temporal tableB...

Read more...

Which configuration tells a switch port to send Cisco Discovery protocol packets that configure an attached Cisco IP phone to trust tagged traffic that is received from a device that is connected to the access port on the Cisco IP phone?

Which configuration tells a switch port to send Cisco Discovery protocol packets that configure an attached Cisco IP phone to trust tagged traffic that is received from a device that is connected to the access port on the Cisco IP phone? A) B) C) D) A . Option AB ....

Read more...

Which of the following is the reason why a penetration tester would run the chkconfig –del service name command at the end of an engagement?

Which of the following is the reason why a penetration tester would run the chkconfig --del service name command at the end of an engagement?A . To remove the persistenceB . To enable penitenceC . To report persistenceD . To check for persistenceView AnswerAnswer: A

Read more...