Which of the following provides a security professional with most information about the system’s security posture?
Which of the following provides a security professional with most information about the system’s security posture?A . Wardriving, warchalking, social engineeringB . Social engineering, company site browsing, tailgatingC . Phishing, spamming, sending trojansD . Port scanning, banner grabbing, service identificationView AnswerAnswer: D
Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?
Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?A . onB . autoC . activeD . desirableView AnswerAnswer: A
What is the most proper answer?
Darius is analysing logs from IDS. He want to understand what have triggered one alert and verify if it's true positive or false positive. Looking at the logs he copy and paste basic details like below: source IP: 192.168.21.100 source port: 80 destination IP: 192.168.10.23 destination port: 63221 What is...
What part of the Architecture Repository holds specifications to Which architectures must conform?
What part of the Architecture Repository holds specifications to Which architectures must conform?A . Standards Information BaseB . Enterprise ContinuumC . Governance LogD . Architecture LandscapeE . Reference LibraryView AnswerAnswer: A
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals. Your network contains an Active Directory domain named contoso.com. The domain contains a DNS server named Server1. All...
During LDAP/S integration you should specify the Fully Qualified Domain Name (FQDN) of the Domain Controller.
During LDAP/S integration you should specify the Fully Qualified Domain Name (FQDN) of the Domain Controller.A . TRUEB . FALSEView AnswerAnswer: A
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
Darius is analysing IDS logs. During the investigation, he noticed that there was nothing suspicious found and an alert was triggered on normal web application traffic.
Darius is analysing IDS logs. During the investigation, he noticed that there was nothing suspicious found and an alert was triggered on normal web application traffic. He can mark this alert as:A . False-NegativeB . False-PositiveC . True-PositiveD . False-SignatureView AnswerAnswer: A
What is a benefit of data modeling languages like YANG?
What is a benefit of data modeling languages like YANG?A . They create more secure and efficient SNMP OIDs.B . They provide a standardized data structure, which results in configuration scalability and consistency.C . They enable programmers to change or write their own applications within the device operating system.D ....
Complete the sentence. In TOGAF, every architecture view has an associated ____ that describes it, at least implicitly.
Complete the sentence. In TOGAF, every architecture view has an associated ____ that describes it, at least implicitly.A . architecture building blockB . architecture modelC . architecture visionD . requirementE . viewpointView AnswerAnswer: E