Which two mechanisms are available to secure NTP? (Choose two.)

Which two mechanisms are available to secure NTP? (Choose two.)A . IPsecB . IP prefix list-basedC . encrypted authenticationD . TACACS-based authenticationE . IP access list-basedView AnswerAnswer: CE Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/ios-xml/ios/bsm/configuration/xe­3se/3650/bsm-xe-3se-3650-book.html

September 18, 2020 No Comments READ MORE +

The consideration of value creation is a principle of which stage of the service lifecycle?

The consideration of value creation is a principle of which stage of the service lifecycle?A . Continual service improvementB . Service strategyC . Service designD . Service transitionView AnswerAnswer: B

September 18, 2020 No Comments READ MORE +

Which role is responsible for carrying out the activities of a process?

Which role is responsible for carrying out the activities of a process?A . Process ownerB . Change managerC . Service managerD . Process practitionerView AnswerAnswer: D

September 18, 2020 No Comments READ MORE +

What are two possible Azure services that you can use?

You have an Azure subscription. Users access the resources in the subscription from either home or from customer sites. From home, users must establish a point-to-site VPN to access the Azure resources. The users on the customer sites access the Azure resources by using site-to-site VPNs. You have a line-of-business...

September 18, 2020 No Comments READ MORE +

Which setting in the WLC must be disabled before the floor calibration is started?

A wireless engineer is calibrating a floor using Cisco Prime Infrastructure. Which setting in the WLC must be disabled before the floor calibration is started?A . CleanAirB . Dynamic Channel AssignmentC . Coverage Hole DetectionD . Tx Power ControlView AnswerAnswer: B

September 18, 2020 No Comments READ MORE +

Service transition contains detailed descriptions of which processes?

Service transition contains detailed descriptions of which processes?A . Change management, service asset and configuration management, release and deployment managementB . Change management, capacity management event management, service request managementC . Service level management, service portfolio management, service asset and configuration managementD . Service asset and configuration management, release and...

September 18, 2020 No Comments READ MORE +

Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?

Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?A . [cache:]B . [site:]C . [inurl:]D . [link:]View AnswerAnswer: B

September 18, 2020 No Comments READ MORE +

What are two possible effects of the change?

You have an Azure subscription. You configure the subscription to use a different Azure Active Directory (Azure AD) tenant. What are two possible effects of the change? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . Role assignments at the subscription level are...

September 18, 2020 No Comments READ MORE +

You need to create a new Azure Active Directory (Azure AD) directory named 11641655.onmicrosoft.com and a user named User1 in the new directory. The solution must ensure that User1 is enabled for Azure Multi-Factor Authentication (MFA)

SIMULATION You need to create a new Azure Active Directory (Azure AD) directory named 11641655.onmicrosoft.com and a user named User1 in the new directory. The solution must ensure that User1 is enabled for Azure Multi-Factor Authentication (MFA). To complete this task, sign in to the Azure portal.View AnswerAnswer: Step 1:...

September 18, 2020 No Comments READ MORE +

Which two criteria should an administrator use when defining Location Awareness for the Symantec Endpoint Protection (SEP) client? (Select two.)

Which two criteria should an administrator use when defining Location Awareness for the Symantec Endpoint Protection (SEP) client? (Select two.)A . NIC descriptionB . SEP domainC . geographic locationD . WINS serverE . Network SpeedView AnswerAnswer: AD

September 18, 2020 No Comments READ MORE +