Where would you expect incident resolution targets to be documented?
Where would you expect incident resolution targets to be documented?A . A service level agreement (SLA)B . A request for change (RFC)C . The service portfolioD . A service descriptionView AnswerAnswer: A
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)A . data exfiltrationB . command and control communicationC . intelligent proxyD . snortE . URL categorizationView AnswerAnswer: AB Explanation: Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-aglance-c45-736555.pdf
What should you do?
You need to ensure that users can access VM0. The solution must meet the platform protection requirements. What should you do?A . Move VM0 to Subnet1.B . On Firewall, configure a network traffic filtering rule.C . Assign RT1 to AzureFirewallSubnet.D . On Firewall, configure a DNAT rule.View AnswerAnswer: A Explanation:...
How do TCP and UDP differ in the way that they establish a connection between two endpoints?
How do TCP and UDP differ in the way that they establish a connection between two endpoints?A . TCP uses the three-way handshake, and UDP does not guarantee message delivery.B . TCP uses synchronization packets, and UDP uses acknowledgment packets.C . UDP provides reliable message transfer, and TCP is a...
Which one of the following is an objective of service catalogue management?
Which one of the following is an objective of service catalogue management?A . Negotiating and agreeing service level agreementB . Negotiating and agreeing operational level agreementsC . Ensuring that the service catalogue is made available to those approved to access itD . Only ensuring that adequate technical resources are availableView...
What should you do first?
You need to prepare for the deployment of the Phoenix office computers. What should you do first?A . Extract the hardware ID information of each computer to a CSV file and upload the file from the Devices settings in Microsoft Store for Business.B . Extract the serial number information of...
Does this meet the goal?
Question Set 3 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct...
What are two supported Symantec Endpoint Protection Manager authentication types? (Select two.)
What are two supported Symantec Endpoint Protection Manager authentication types? (Select two.)A . Microsoft Active DirectoryB . MS-CHAPC . RSA SecurIDD . BiometricsE . Network Access ControlView AnswerAnswer: AC
What is one of the reasons that customers need a Visibility & Enforcement solution?
What is one of the reasons that customers need a Visibility & Enforcement solution?A . Businesses can't see or protect devices on their networkB . Network traffic is growing at an exponential rateC . Storage is moving from on-premises to cloud-basedD . Organizations need the ability to block high-risk websitesView...
Which two items should an administrator enter in the License Activation Wizard to activate a license? (Select two.)
Which two items should an administrator enter in the License Activation Wizard to activate a license? (Select two.)A . password for the Symantec Licensing SiteB . purchase order numberC . serial numberD . Symantec License fileE . credit card numberView AnswerAnswer: CD