R1 has learned route 10.10.10.0/24 via numerous routing protocols, which route is installed?
R1 has learned route 10.10.10.0/24 via numerous routing protocols, which route is installed?A . route with the lowest costB . route with the shortest prefix lengthC . route with the next hop that has the highest IPD . route with the lowest administrative distanceView AnswerAnswer: D
Which process is responsible for the availability, confidentiality and integrity of data?
Which process is responsible for the availability, confidentiality and integrity of data?A . Service catalogue managementB . Service asset and configuration managementC . Change managementD . Information security managementView AnswerAnswer: D
What type of method is Sam using to evade IDS?
Sam is working as s pen-tester in an organization in Houston. He performs penetration testing on IDS in order to find the different ways an attacker uses to evade the IDS. Sam sends a large amount of packets to the target IDS that generates alerts, which enable Sam to hide...
Fill in the blank with the appropriate word. The ____________________risk analysis process analyzes the effect of a risk event deriving a numerical value
FILL BLANK Fill in the blank with the appropriate word. The ____________________risk analysis process analyzes the effect of a risk event deriving a numerical value.View AnswerAnswer: quantitative Explanation: Quantitative risk analysis is a process to assess the probability of achieving particular project objectives, to quantify the effect of risks on...
Which storage solution should you recommend?
You are designing an AI solution that will analyze millions of pictures by using Azure HDInsight Hadoop cluster. You need to recommend a solution for storing the pictures. The solution must minimize costs. Which storage solution should you recommend?A . Azure Table storageB . Azure File StorageC . Azure Data...
Code injection is a form of attack in which a malicious user:
Code injection is a form of attack in which a malicious user:A . Inserts text into a data field that gets interpreted as codeB . Gets the server to execute arbitrary code using a buffer overflowC . Inserts additional code into the JavaScript running in the browserD . Gains access...
Which one of the following is NOT part of the approach to Phase H C Architecture Change Management?
Which one of the following is NOT part of the approach to Phase H C Architecture Change Management?A . Business ScenariosB . Capacity MeasurementC . Change ManagementD . Measuring Business GrowthView AnswerAnswer: A
Follow the sun
Follow the sunA . 1, 2 and 4 onlyB . 2, 3 and 4 onlyC . 1, 3 and 4 onlyD . 1, 2 and 3 onlyView AnswerAnswer: A
What type of record should you create for each card?
You are a sales professional for a medium-sized firm. You are entering information into Microsoft Dynamics you organized at a trade show. What type of record should you create for each card?A . ProspectB . LeadC . AccountD . OpportunityView AnswerAnswer: B
Which behavior can be expected when the HSRP version is changed from 1 to 2?
Which behavior can be expected when the HSRP version is changed from 1 to 2?A . No changes occur because the standby router is upgraded before the active router.B . No changes occur because version 1 and 2 use the same virtual MAC OUD . Each HSRP group reinitializes because...