Enjoy 15% Discount With Coupon 15off

Yearly Archives - 2023

Which of the following can be used to identify potential attacker activities without affecting production servers?

Which of the following can be used to identify potential attacker activities without affecting production servers?A . Honey potB . Video surveillanceC . Zero TrustD . GeofencingView AnswerAnswer: A Explanation: A honey pot is a system or a network that is designed to mimic a real production server and attract...

Read more...

Which two statements are correct when traffic matches the implicit SD-WAN rule? (Choose two.)

Which two statements are correct when traffic matches the implicit SD-WAN rule? (Choose two.)A . The sdwan_service_id flag in the session information is 0.B . All SD-WAN rules have the default setting enabled.C . Traffic does not match any of the entries in the policy route table.D . Traffic is...

Read more...

Which steps need to be implemented to allow ClearPass to perform a CoA and change the access for this wired device?

A network engineer recently identified that a wired device connected to a CX Switch is misbehaving on the network To address this issue, a new ClearPass policy has been put in place to prevent this device from connecting to the network again. Which steps need to be implemented to allow...

Read more...

Which service should you use to determine a user’s intent?

Topic 4, Describe features of Natural Language Processing (NLP) workloads on Azure You are developing a chatbot solution in Azure. Which service should you use to determine a user’s intent?A . Translator TextB . QnA MakerC . SpeechD . Language Understanding (LUIS)View AnswerAnswer: D Explanation: Language Understanding (LUIS) is a...

Read more...

Which of the following tools would you use to create a natural language processing application?

Which of the following tools would you use to create a natural language processing application?A . AWS DeepRacerB . Azure SearchC . DeepDreamD . NLTKView AnswerAnswer: D Explanation: NLTK (Natural Language Toolkit) is a Python library that provides a set of tools and resources for natural language processing (NLP). NLP...

Read more...

Which of the following subnets should the technician use?

A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use?A . 255.255.128.0B . 255.255.192.0C . 255.255.240.0D . 255.255.248.0View AnswerAnswer: C Explanation: A subnet mask is a binary number that indicates...

Read more...

Which ZT tenet is based on the notion that malicious actors reside inside and outside the network?

Which ZT tenet is based on the notion that malicious actors reside inside and outside the network?A . Assume breachB . Assume a hostile environmentC . Scrutinize explicitlyD . Requiring continuous monitoringView AnswerAnswer: A Explanation: The ZT tenet of assume breach is based on the notion that malicious actors reside...

Read more...