Which command should you run on the Hyper-V host?

HOTSPOT You have a virtual machine named VM1 that runs Windows Server 2016. VM1 is a Remote Desktop Services (RDS) server. You need to ensure that only TCP port 3389 can be used to connect to VM1 over the network. Which command should you run on the Hyper-V host? To...

September 25, 2020 No Comments READ MORE +

When a site-to-site VPN is used, which protocol is responsible for the transport of user data?

When a site-to-site VPN is used, which protocol is responsible for the transport of user data?A . IKEv2B . IKEv1C . IPsecD . MD5View AnswerAnswer: C

September 25, 2020 No Comments READ MORE +

What is a difference between RADIUS and TACACS+?

What is a difference between RADIUS and TACACS+?A . TACACS+ encrypts only password information and RADIUS encrypts the entire payloadB . RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commandsC . RADIUS is most appropriate for dial authentication, but TACACS+...

September 25, 2020 No Comments READ MORE +

Fill in the blank with the appropriate term. ______________________ is typically carried out by a remote attacker attempting to gain information or access to a network on which it is not authorized or allowed

FILL BLANK Fill in the blank with the appropriate term. ______________________ is typically carried out by a remote attacker attempting to gain information or access to a network on which it is not authorized or allowed.View AnswerAnswer: Network reconnaissance Explanation: Network reconnaissance is typically carried out by a remote attacker...

September 25, 2020 No Comments READ MORE +

What should you check first?

You are successfully managing passwords in the alpha.cyberark.com domain; however, when you attempt to manage a password in the beta.cyberark.com domain, you receive the ‘network path not found’ error. What should you check first?A . That the username and password are correct.B . That the CPM can successfully resolve addresses...

September 25, 2020 No Comments READ MORE +

A virus that attempts to install itself inside the file it is infecting is called?

A virus that attempts to install itself inside the file it is infecting is called?A . Tunneling virusB . Cavity virusC . Polymorphic virusD . Stealth virusView AnswerAnswer: B

September 25, 2020 No Comments READ MORE +

Assuming that the following snippet has been successfully executed, which of the equations are True? (Select two answers)

Assuming that the following snippet has been successfully executed, which of the equations are True? (Select two answers) A . len(a) == len (b)B . b [0] +1 ==a [0]C . a [0] == b [0]D . a [0] + 1 ==b [0]View AnswerAnswer: AC Explanation:

September 25, 2020 No Comments READ MORE +

Which configuration accomplishes this task?

Router R1 must send all traffic without a matching routing-table entry to 192.168.1.1. Which configuration accomplishes this task?A . R1# config t R1(config)# ip routing R1(config)# ip route default-route 192.168.1.1B . R1# config t R1(config)# ip routing R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.1C . R1# config t R1(config)# ip routing...

September 25, 2020 No Comments READ MORE +

What should a release policy include?

What should a release policy include?A . The process owner and process manager for each type of releaseB . The roles and responsibilities for incident and problem resolutionC . The naming convention and expected frequency of each type of releaseD . The naming convention for all configuration items (CI) recorded...

September 25, 2020 No Comments READ MORE +

Which approach should a developer use to add pagination to a Visualforce page?

Which approach should a developer use to add pagination to a Visualforce page?A . A StandardControllerB . The Action attribute for a pageC . The extensions attribute for a pageD . A StandardSetControllerView AnswerAnswer: D

September 25, 2020 No Comments READ MORE +