Enjoy 15% Discount With Coupon 15off

Monthly Archives - May 2021

What should you recommend?

You need to recommend a backup strategy for CONT_SQL1 and CONT_SQL2. What should you recommend?A . Use AzCopy and store the data in Azure.B . Configure Azure SQL Database long-term retention for all databases.C . Configure Accelerated Database Recovery.D . Use DWLoader.View AnswerAnswer: B Explanation: Scenario: The database backups have...

Read more...

Which two actions can be used in an access control policy rule? (Choose two.)

Which two actions can be used in an access control policy rule? (Choose two.)A . Block with ResetB . MonitorC . AnalyzeD . DiscoverE . Block ALLView AnswerAnswer: A,B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/AC-Rules-Tuning-Overview.html#71854

Read more...

Which three objects can you use?

You need to trigger a Flow when a technical service order request is created. Which three objects can you use? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . Work itemsB . Change-based alertsC . Business EventsD . External feedsE . WorkflowView AnswerAnswer:...

Read more...

Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?

Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?A . Global ProtectB . WildFireC . AutoFocusD . STIXView AnswerAnswer: C

Read more...