Which command should you run on the Hyper-V host?
HOTSPOT You have a virtual machine named VM1 that runs Windows Server 2016. VM1 is a Remote Desktop Services (RDS) server. You need to ensure that only TCP port 3389 can be used to connect to VM1 over the network. Which command should you run on the Hyper-V host? To...
When a site-to-site VPN is used, which protocol is responsible for the transport of user data?
When a site-to-site VPN is used, which protocol is responsible for the transport of user data?A . IKEv2B . IKEv1C . IPsecD . MD5View AnswerAnswer: C
What is a difference between RADIUS and TACACS+?
What is a difference between RADIUS and TACACS+?A . TACACS+ encrypts only password information and RADIUS encrypts the entire payloadB . RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commandsC . RADIUS is most appropriate for dial authentication, but TACACS+...
Fill in the blank with the appropriate term. ______________________ is typically carried out by a remote attacker attempting to gain information or access to a network on which it is not authorized or allowed
FILL BLANK Fill in the blank with the appropriate term. ______________________ is typically carried out by a remote attacker attempting to gain information or access to a network on which it is not authorized or allowed.View AnswerAnswer: Network reconnaissance Explanation: Network reconnaissance is typically carried out by a remote attacker...
What should you check first?
You are successfully managing passwords in the alpha.cyberark.com domain; however, when you attempt to manage a password in the beta.cyberark.com domain, you receive the ‘network path not found’ error. What should you check first?A . That the username and password are correct.B . That the CPM can successfully resolve addresses...
A virus that attempts to install itself inside the file it is infecting is called?
A virus that attempts to install itself inside the file it is infecting is called?A . Tunneling virusB . Cavity virusC . Polymorphic virusD . Stealth virusView AnswerAnswer: B
Assuming that the following snippet has been successfully executed, which of the equations are True? (Select two answers)
Assuming that the following snippet has been successfully executed, which of the equations are True? (Select two answers) A . len(a) == len (b)B . b [0] +1 ==a [0]C . a [0] == b [0]D . a [0] + 1 ==b [0]View AnswerAnswer: AC Explanation:
Which configuration accomplishes this task?
Router R1 must send all traffic without a matching routing-table entry to 192.168.1.1. Which configuration accomplishes this task?A . R1# config t R1(config)# ip routing R1(config)# ip route default-route 192.168.1.1B . R1# config t R1(config)# ip routing R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.1C . R1# config t R1(config)# ip routing...
What should a release policy include?
What should a release policy include?A . The process owner and process manager for each type of releaseB . The roles and responsibilities for incident and problem resolutionC . The naming convention and expected frequency of each type of releaseD . The naming convention for all configuration items (CI) recorded...
Which approach should a developer use to add pagination to a Visualforce page?
Which approach should a developer use to add pagination to a Visualforce page?A . A StandardControllerB . The Action attribute for a pageC . The extensions attribute for a pageD . A StandardSetControllerView AnswerAnswer: D