What are the three fundamental principles of security?
What are the three fundamental principles of security?A . Accountability, confidentiality, and integrityB . Confidentiality, integrity, and availabilityC . Integrity, availability, and accountabilityD . Availability, accountability, and confidentialityView AnswerAnswer: B
What should be the oversubscription rate for the spine?
Refer to the exhibit. A customer plans to deploy a two-tier OSPF ECMP Core in the configuration shown. All uplinks to the spine are 40Gbps. All uplinks to the leaves are 10Gbps. What should be the oversubscription rate for the spine?A . 10:1B . 2:1C . 1:1D . 4:1View AnswerAnswer:...
What is the first step the developer must take to create the campaign?
An app developer wants to create a new campaign for a venue app. What is the first step the developer must take to create the campaign?A . Click on the proximity beacon on the map and associate it to a campaign.B . Create a title for the campaign in the...
Which two statements are true regarding Full and Half call model processing? (Choose two.)
Which two statements are true regarding Full and Half call model processing? (Choose two.)A . Avaya Aura® Session Manager (SM) always performs Half call model processing.B . Avaya Aura® Communication Manager (CM) configured as a Feature Server performs Full call model processing.C . Avaya Aura® Communication Manager (CM) configured as...
Which two steps will fix this problem?
Refer to the image. You have three VPCs: A, B, and C. VPCs A and C are both peered with VPC B. The IP address ranges are as follows: - VPC A: 10.0.0.0/16 - VPC B: 192.168.0.0/16 - VPC C: 10.0.0.0/16 Instance i-1 in VPC A has the IP address...
The primary service provided by Kerberos is which of the following?
The primary service provided by Kerberos is which of the following?A . non-repudiationB . confidentialityC . authenticationD . authorizationView AnswerAnswer: C Explanation: non-repudiation. Since Kerberos deals primarily with symmetric cryptography, it does not help with non-repudiation. confidentiality. Once the client is authenticated by Kerberos and obtains its session key and...
Which IBM offering would the IBM specialist recommend?
A cloud customer is implementing a new solution for backups. The customer is concerned about the large amount of historical data that has to be retained offsite and new data it needs to back up from other applications. The customer believes that the new system may need to scale to...
Which resource categories can be included in a scope? (Select two.)
Which resource categories can be included in a scope? (Select two.)A . racksB . firmware bundlesC . data centersD . enclosuresView AnswerAnswer: A, B
Which of the following is a tool the technician can use to resolve the issue?
A user’s Windows laptop has become consistently slower over time. The technician checks the CPU utilization and sees that it varies between 95% and 100%. After the technician closes some running applications, the CPU utilization drops to approximately 20%, and the laptop runs much faster. The next day the same...
Which product should the technical specialist propose?
A customer needs to implement a block storage solution to achieve performance advantages using a hybrid disk configuration of flash cards, 15K drives, 7.2K drives. Which product should the technical specialist propose?A . IBM Spectrum ScaleB . IBM XIVC . IBM DS8886D . IBM Protec TIER TS7650GView AnswerAnswer: C Explanation:...