Which of the following representatives of the incident response team takes forensic backups of systems that are the focus of an incident?

Which of the following representatives of the incident response team takes forensic backups of systems that are the focus of an incident?A . Technical representativeB . Lead investigatorC . Information security representativeD . Legal representativeView AnswerAnswer: A Explanation: A technical representative creates forensic backups of systems that are the focus...

September 16, 2020 No Comments READ MORE +

What are two tenants of establishing an SD-perimeter? (Choose two.)

What are two tenants of establishing an SD-perimeter? (Choose two.)A . Securing device accessB . Securing app accessC . Securing user-device trustD . Securing endpointsE . Securing network accessView AnswerAnswer: A B

September 16, 2020 No Comments READ MORE +

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . smurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C

September 15, 2020 No Comments READ MORE +

What should you include in the recommendation?

Your network contains an Active Directory domain that is synced to Microsoft Azure Active Directory (Azure AD). The domain contains 500 laptops that run Windows 8.1 Professional. The users of the laptops work from home. Your company uses Microsoft Intune, the Microsoft Deployment Toolkit (MDT), and Windows Configuration Designer to...

September 15, 2020 No Comments READ MORE +

Which action tests the routing?

An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed through the Cisco Umbrella network. Which action tests the routing?A . Ensure that the client computers are pointing to the on-premises DNS servers.B . Enable the Intelligent Proxy to validate that traffic...

September 15, 2020 1 Comment READ MORE +

What should you configure?

Your company has a Microsoft Azure Active Directory (Azure AD) tenant. The company has a Volume Licensing Agreement and uses a product key to activate Windows 10. You plan to deploy Windows 10 Pro to 200 new computers by using the Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS)....

September 15, 2020 No Comments READ MORE +

What will happen to unauthenticated users when an active authentication policy is followed by a fall through policy without authentication?

Examine the FortiGate configuration: What will happen to unauthenticated users when an active authentication policy is followed by a fall through policy without authentication?A . The user must log in again to authenticate.B . The user will be denied access to resources without authentication.C . The user will not be...

September 15, 2020 1 Comment READ MORE +

Which algorithm provides encryption and authentication for data plane communication?

Which algorithm provides encryption and authentication for data plane communication?A . AES-GCMB . SHA-96C . AES-256D . SHA-384View AnswerAnswer: A

September 15, 2020 No Comments READ MORE +

What are two solutions Cisco offers for web security? (Choose two.)

What are two solutions Cisco offers for web security? (Choose two.)A . CRESB . NGFWC . CloudlockD . AMP for Web SecurityE . Cognitive IntelligenceView AnswerAnswer: D B

September 15, 2020 No Comments READ MORE +

Which two statements about antivirus scanning mode are true? (Choose two.)

Which two statements about antivirus scanning mode are true? (Choose two.)A . In proxy-based inspection mode, antivirus buffers the whole file for scanning, before sending it to the client.B . In full scan flow-based inspection mode, FortiGate buffers the file, but also simultaneously transmits it to the client.C . In...

September 15, 2020 No Comments READ MORE +