Which of the following cryptography attack is an understatement for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by a coercion or torture?

Which of the following cryptography attack is an understatement for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by a coercion or torture?A . Chosen-Cipher text AttackB . Ciphertext-only AttackC . Timing AttackD . Rubber Hose AttackView AnswerAnswer: D

September 21, 2020 No Comments READ MORE +

What are three main areas of the Cisco Security Portfolio? (Choose three )

What are three main areas of the Cisco Security Portfolio? (Choose three )A . Roaming SecurityB . Advanced ThreatC . Cloud SecurityD . loT SecurityE . Voice & CollaborationF . FirewallsView AnswerAnswer: B C D

September 21, 2020 No Comments READ MORE +

What is the first thing that Nedved needs to do before contacting the incident response team?

Nedved is an IT Security Manager of a bank in his country. One day. he found out that there is a security breach to his company's email server based on analysis of a suspicious connection from the email server to an unknown IP Address. What is the first thing that...

September 21, 2020 No Comments READ MORE +

Which process is responsible for managing relationships with vendors?

Which process is responsible for managing relationships with vendors?A . Change managementB . Service portfolio managementC . Supplier managementD . Continual service improvementView AnswerAnswer: C

September 21, 2020 No Comments READ MORE +

What are two purposes of a vSAN storage policy? (Choose two.)

What are two purposes of a vSAN storage policy? (Choose two.)A . Determine how storage objects are provisionedB . Determine vSAN encryption levelC . Guarantee the required level of serviceD . Enable deduplication and compressionE . Enable TRIM/UNMAPView AnswerAnswer: AC Explanation: Reference: http://www.vmwarearena.com/understanding-vmware-virtual-san-storage-policies-detailed­view/

September 21, 2020 No Comments READ MORE +

Which HPE OneView feature enables the detection of lost Ethernet connectivity on interconnect uplink ports?

Which HPE OneView feature enables the detection of lost Ethernet connectivity on interconnect uplink ports?A . M-LAGB . Smart LinkC . QoSD . VxLANView AnswerAnswer: B

September 21, 2020 No Comments READ MORE +

What are two ways to check the health of a vSAN cluster?

vCenter Server is offline. What are two ways to check the health of a vSAN cluster? (Choose two.)A . ESXi system logs on vSAN datastoreB . vSphere Host ClientC . esxcliD . HCIBenchE . esxtopView AnswerAnswer: BC Explanation: Reference: https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.vsphere.security.doc/GUID­6C181D08-6650-4AD1-92D1-AAFDA3A3E38C.html

September 21, 2020 No Comments READ MORE +

What is a difference between local AP mode and FlexConnect AP mode?

What is a difference between local AP mode and FlexConnect AP mode?A . FlexConnect AP mode fails to function if the AP loses connectivity with the WLC . FlexConnect AP mode bridges the traffic from the AP to the WLC when local switching is configured.D . Local AP mode creates...

September 21, 2020 No Comments READ MORE +

Which of the following BEST describes the purpose of access management?

Which of the following BEST describes the purpose of access management?A . To provide a channel for users to request and receive standard servicesB . Provides the rights for users to be able to use a service or group of servicesC . To prevent problems and resulting Incidents from happeningD...

September 20, 2020 No Comments READ MORE +

When a security analyst prepares for the formal security assessment - what of the following should be done in order to determine inconsistencies in the secure assets database and verify that system is compliant to the minimum security baseline?

When a security analyst prepares for the formal security assessment - what of the following should be done in order to determine inconsistencies in the secure assets database and verify that system is compliant to the minimum security baseline?A . Data items and vulnerability scanningB . Interviewing employees and network...

September 20, 2020 No Comments READ MORE +