Where would you expect incident resolution targets to be documented?

Where would you expect incident resolution targets to be documented?A . A service level agreement (SLA)B . A request for change (RFC)C . The service portfolioD . A service descriptionView AnswerAnswer: A

September 14, 2020 No Comments READ MORE +

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)A . data exfiltrationB . command and control communicationC . intelligent proxyD . snortE . URL categorizationView AnswerAnswer: AB Explanation: Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-a­glance-c45-736555.pdf

September 14, 2020 No Comments READ MORE +

What should you do?

You need to ensure that users can access VM0. The solution must meet the platform protection requirements. What should you do?A . Move VM0 to Subnet1.B . On Firewall, configure a network traffic filtering rule.C . Assign RT1 to AzureFirewallSubnet.D . On Firewall, configure a DNAT rule.View AnswerAnswer: A Explanation:...

September 14, 2020 No Comments READ MORE +

How do TCP and UDP differ in the way that they establish a connection between two endpoints?

How do TCP and UDP differ in the way that they establish a connection between two endpoints?A . TCP uses the three-way handshake, and UDP does not guarantee message delivery.B . TCP uses synchronization packets, and UDP uses acknowledgment packets.C . UDP provides reliable message transfer, and TCP is a...

September 14, 2020 No Comments READ MORE +

Which one of the following is an objective of service catalogue management?

Which one of the following is an objective of service catalogue management?A . Negotiating and agreeing service level agreementB . Negotiating and agreeing operational level agreementsC . Ensuring that the service catalogue is made available to those approved to access itD . Only ensuring that adequate technical resources are availableView...

September 14, 2020 No Comments READ MORE +

What should you do first?

You need to prepare for the deployment of the Phoenix office computers. What should you do first?A . Extract the hardware ID information of each computer to a CSV file and upload the file from the Devices settings in Microsoft Store for Business.B . Extract the serial number information of...

September 14, 2020 No Comments READ MORE +

Does this meet the goal?

Question Set 3 Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct...

September 14, 2020 No Comments READ MORE +

What are two supported Symantec Endpoint Protection Manager authentication types? (Select two.)

What are two supported Symantec Endpoint Protection Manager authentication types? (Select two.)A . Microsoft Active DirectoryB . MS-CHAPC . RSA SecurIDD . BiometricsE . Network Access ControlView AnswerAnswer: AC

September 14, 2020 No Comments READ MORE +

What is one of the reasons that customers need a Visibility & Enforcement solution?

What is one of the reasons that customers need a Visibility & Enforcement solution?A . Businesses can't see or protect devices on their networkB . Network traffic is growing at an exponential rateC . Storage is moving from on-premises to cloud-basedD . Organizations need the ability to block high-risk websitesView...

September 14, 2020 No Comments READ MORE +

Which two items should an administrator enter in the License Activation Wizard to activate a license? (Select two.)

Which two items should an administrator enter in the License Activation Wizard to activate a license? (Select two.)A . password for the Symantec Licensing SiteB . purchase order numberC . serial numberD . Symantec License fileE . credit card numberView AnswerAnswer: CD

September 14, 2020 No Comments READ MORE +