Which of the following TCP ports is used by the Windows OS for file sharing?
Which of the following TCP ports is used by the Windows OS for file sharing?A . 53 B. 389 C. 445 D. 1433View AnswerAnswer: C
Which of the following TCP ports is used by the Windows OS for file sharing?A . 53 B. 389 C. 445 D. 1433View AnswerAnswer: C
Which of the following functions does the scheduling agreement with release documentation enable? Note: There are 2 correct Answers to this question.A . Generate Just-in-Time delivery schedules automatically using MRP B. Generate delivery schedules using a background job. C. Generate delivery schedules using a release creation profile. D. Generate forecast...
What Nutanix product provides multi-cloud cost and security governance?A . Era B. Leap C. Beam D. FlowView AnswerAnswer: C
Which of the following tools or techniques is used by software developers to maintain code, but also used by hackers to maintain control of a compromised system?A . Disassembler B. Backdoor C. Debugger D. Stack pointerView AnswerAnswer: B
A company is collecting the requirements for an on-premises event. During the event, a wireless client connected to a dedicated WLAN will run a video application that will need on average 391595179 bits per second to function properly. What is the QoS marking that needs to be applied to that...
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
You need to configure the detection of multi-staged attacks to meet the monitoring requirements. What should you do?A . Customize the Azure Sentinel rule logic. B. Create a workbook. C. Add Azure Sentinel data connectors. D. Add an Azure Sentinel playbook.View AnswerAnswer: A
Which of the following is required when connecting an endpoint device with an RJ45 port to a network device with an ST port?A . A media converter B. A bridge C. An MDIX D. A load balancerView AnswerAnswer: A
A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within 48 hours, multiple assets were breached, affecting the confidentiality of sensitive information. What is the threat actor in this incident?A . company assets that are threatened...
A branch of a company recently switched to a new ISP. The network engineer was given a new IP range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now has the following configurations on the interface that peers to the ISP: The network engineer observes that all...