Which protocol establishes network redundancy in a switched Firepower device deployment?
Which protocol establishes network redundancy in a switched Firepower device deployment?A . STPB . HSRPC . GLBPD . VRRPView AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-configguide-v62/firepower_threat_defense_high_availability.html
When should a Sprint Goal be created?
When should a Sprint Goal be created?A . It should have been created in the previous Sprint during Product Backlog refinement.B . It must be established before Sprint Planning in order to begin planning.C . A Sprint Goal is not mandatory in Scrum.D . At any time during the Sprint.E...
What is a functionality of port objects in Cisco FMC?
What is a functionality of port objects in Cisco FMC?A . to mix transport protocols when setting both source and destination port conditions in a ruleB . to represent protocols other than TCP, UDP, and ICMPC . to represent all protocols in the same wayD . to add any protocol...
Which of the following terms is used to describe a major deliverable or key even in the project used to measure project progress?
Which of the following terms is used to describe a major deliverable or key even in the project used to measure project progress?A . Project life cycleB . PhaseC . AchievementD . MilestoneView AnswerAnswer: D
Which solution should the consultant utilize to meet the requirement?
universal containers wants to report on the volume of products installed within a specific timeframe. Which solution should the consultant utilize to meet the requirement?A . A work order related list on assetB . A custom installation date field on products consumedC . Field history tracking on assetD . The...
If someone opt-out's do we need to delete this Prospect record?
If someone opt-out's do we need to delete this Prospect record?A . Yes, it is restricted by lawB . False. It is restricted by lawnot to email them, but we still can track the activityView AnswerAnswer: B
The Information Security Management program MUST protect:
The Information Security Management program MUST protect:A . all organizational assetsB . critical business processes and /or revenue streamsC . intellectual property released into the public domainD . against distributed denial of service attacksView AnswerAnswer: B
Based on the following image, which of the following choices is also true about London Linux Servers?
Based on the following image, which of the following choices is also true about London Linux Servers? A . It is a CMDB Group with Dashboard Group type.B . It is a CMDB Group with Health Group type.C . It is a Datacenter Group in London.D . It is a...
Which two actions should you perform?
You are a Microsoft 365 administrator for a company. Employees use Microsoft Office 365 ProPlus to create documents. You need to implement document classification and protection by using Microsoft Azure Information Protection. Which two actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection...
When Avaya Aura® Presence Services is implemented, which statement is true about Port Management?
When Avaya Aura® Presence Services is implemented, which statement is true about Port Management?A . It allows multi-media services over a standard Web-Browser.B . It allows independent management capabilities to filter out undesired message to every Avaya Aura® Presence Services user.C . It collects statistics about Port-Usage from each Presence-compatible...