Which of the following cryptography attack is an understatement for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by a coercion or torture?
Which of the following cryptography attack is an understatement for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by a coercion or torture?A . Chosen-Cipher text AttackB . Ciphertext-only AttackC . Timing AttackD . Rubber Hose AttackView AnswerAnswer: D
What are three main areas of the Cisco Security Portfolio? (Choose three )
What are three main areas of the Cisco Security Portfolio? (Choose three )A . Roaming SecurityB . Advanced ThreatC . Cloud SecurityD . loT SecurityE . Voice & CollaborationF . FirewallsView AnswerAnswer: B C D
What is the first thing that Nedved needs to do before contacting the incident response team?
Nedved is an IT Security Manager of a bank in his country. One day. he found out that there is a security breach to his company's email server based on analysis of a suspicious connection from the email server to an unknown IP Address. What is the first thing that...
Which process is responsible for managing relationships with vendors?
Which process is responsible for managing relationships with vendors?A . Change managementB . Service portfolio managementC . Supplier managementD . Continual service improvementView AnswerAnswer: C
What are two purposes of a vSAN storage policy? (Choose two.)
What are two purposes of a vSAN storage policy? (Choose two.)A . Determine how storage objects are provisionedB . Determine vSAN encryption levelC . Guarantee the required level of serviceD . Enable deduplication and compressionE . Enable TRIM/UNMAPView AnswerAnswer: AC Explanation: Reference: http://www.vmwarearena.com/understanding-vmware-virtual-san-storage-policies-detailedÂview/
Which HPE OneView feature enables the detection of lost Ethernet connectivity on interconnect uplink ports?
Which HPE OneView feature enables the detection of lost Ethernet connectivity on interconnect uplink ports?A . M-LAGB . Smart LinkC . QoSD . VxLANView AnswerAnswer: B
What are two ways to check the health of a vSAN cluster?
vCenter Server is offline. What are two ways to check the health of a vSAN cluster? (Choose two.)A . ESXi system logs on vSAN datastoreB . vSphere Host ClientC . esxcliD . HCIBenchE . esxtopView AnswerAnswer: BC Explanation: Reference: https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.vsphere.security.doc/GUIDÂ6C181D08-6650-4AD1-92D1-AAFDA3A3E38C.html
What is a difference between local AP mode and FlexConnect AP mode?
What is a difference between local AP mode and FlexConnect AP mode?A . FlexConnect AP mode fails to function if the AP loses connectivity with the WLC . FlexConnect AP mode bridges the traffic from the AP to the WLC when local switching is configured.D . Local AP mode creates...
Which of the following BEST describes the purpose of access management?
Which of the following BEST describes the purpose of access management?A . To provide a channel for users to request and receive standard servicesB . Provides the rights for users to be able to use a service or group of servicesC . To prevent problems and resulting Incidents from happeningD...
When a security analyst prepares for the formal security assessment - what of the following should be done in order to determine inconsistencies in the secure assets database and verify that system is compliant to the minimum security baseline?
When a security analyst prepares for the formal security assessment - what of the following should be done in order to determine inconsistencies in the secure assets database and verify that system is compliant to the minimum security baseline?A . Data items and vulnerability scanningB . Interviewing employees and network...