R1 has learned route 10.10.10.0/24 via numerous routing protocols, which route is installed?

R1 has learned route 10.10.10.0/24 via numerous routing protocols, which route is installed?A . route with the lowest costB . route with the shortest prefix lengthC . route with the next hop that has the highest IPD . route with the lowest administrative distanceView AnswerAnswer: D

September 19, 2020 No Comments READ MORE +

Which process is responsible for the availability, confidentiality and integrity of data?

Which process is responsible for the availability, confidentiality and integrity of data?A . Service catalogue managementB . Service asset and configuration managementC . Change managementD . Information security managementView AnswerAnswer: D

September 19, 2020 No Comments READ MORE +

What type of method is Sam using to evade IDS?

Sam is working as s pen-tester in an organization in Houston. He performs penetration testing on IDS in order to find the different ways an attacker uses to evade the IDS. Sam sends a large amount of packets to the target IDS that generates alerts, which enable Sam to hide...

September 19, 2020 No Comments READ MORE +

Fill in the blank with the appropriate word. The ____________________risk analysis process analyzes the effect of a risk event deriving a numerical value

FILL BLANK Fill in the blank with the appropriate word. The ____________________risk analysis process analyzes the effect of a risk event deriving a numerical value.View AnswerAnswer: quantitative Explanation: Quantitative risk analysis is a process to assess the probability of achieving particular project objectives, to quantify the effect of risks on...

September 19, 2020 No Comments READ MORE +

Which storage solution should you recommend?

You are designing an AI solution that will analyze millions of pictures by using Azure HDInsight Hadoop cluster. You need to recommend a solution for storing the pictures. The solution must minimize costs. Which storage solution should you recommend?A . Azure Table storageB . Azure File StorageC . Azure Data...

September 19, 2020 No Comments READ MORE +

Code injection is a form of attack in which a malicious user:

Code injection is a form of attack in which a malicious user:A . Inserts text into a data field that gets interpreted as codeB . Gets the server to execute arbitrary code using a buffer overflowC . Inserts additional code into the JavaScript running in the browserD . Gains access...

September 19, 2020 No Comments READ MORE +

Which one of the following is NOT part of the approach to Phase H C Architecture Change Management?

Which one of the following is NOT part of the approach to Phase H C Architecture Change Management?A . Business ScenariosB . Capacity MeasurementC . Change ManagementD . Measuring Business GrowthView AnswerAnswer: A

September 19, 2020 No Comments READ MORE +

Follow the sun

Follow the sunA . 1, 2 and 4 onlyB . 2, 3 and 4 onlyC . 1, 3 and 4 onlyD . 1, 2 and 3 onlyView AnswerAnswer: A

September 19, 2020 No Comments READ MORE +

What type of record should you create for each card?

You are a sales professional for a medium-sized firm. You are entering information into Microsoft Dynamics you organized at a trade show. What type of record should you create for each card?A . ProspectB . LeadC . AccountD . OpportunityView AnswerAnswer: B

September 19, 2020 No Comments READ MORE +

Which behavior can be expected when the HSRP version is changed from 1 to 2?

Which behavior can be expected when the HSRP version is changed from 1 to 2?A . No changes occur because the standby router is upgraded before the active router.B . No changes occur because version 1 and 2 use the same virtual MAC OUD . Each HSRP group reinitializes because...

September 19, 2020 No Comments READ MORE +