Which of the following offers advantages such as the ability to use stronger passwords, easier password administration, one set of credential, and faster resource access?

Which of the following offers advantages such as the ability to use stronger passwords, easier password administration, one set of credential, and faster resource access?A .  Smart cardsB .  Single Sign-On (SSO)C .  Symmetric CiphersD .  Public Key Infrastructure (PKI)View AnswerAnswer: B Explanation: The advantages of SSO include having the...

March 19, 2019 No Comments READ MORE +

Which of the following is NOT true of the Kerberos protocol?

Which of the following is NOT true of the Kerberos protocol?A .  Only a single login is required per session.B .  The initial authentication steps are done using public key algorithm.C .  The KDC is aware of all systems in the network and is trusted by all of themD ....

March 19, 2019 No Comments READ MORE +

A security evaluation report and an accreditation statement are produced in which of the following phases of the system development life cycle?

A security evaluation report and an accreditation statement are produced in which of the following phases of the system development life cycle?A .  project initiation and planning phaseB .  system design specification phaseC .  development & documentation phaseD .  acceptance phaseView AnswerAnswer: D Explanation: The Answer "acceptance phase". Note the...

March 19, 2019 No Comments READ MORE +

What is the best way to stop the failover operation and continue using the primary cluster?

An Isilon customer has set up a replication policy between a primary cluster and a secondary cluster. After the initial synchronization of the clusters, the primary cluster starts to display some issues. The customer initiates a failover operation between the two clusters. During the failover, the primary cluster becomes fully...

March 19, 2019 No Comments READ MORE +

Why do large OSPF networks use a hierarchical design? (Choose three.)

Why do large OSPF networks use a hierarchical design? (Choose three.)A . to decrease latency by increasing bandwidthB . to reduce routing overheadC . to speed up convergenceD . to confine network instability to single areas of the networkE . to reduce the complexity of router configurationF . to lower...

March 19, 2019 No Comments READ MORE +

To which of these objects can link policies apply in FortiADC? (Choose two.)

To which of these objects can link policies apply in FortiADC? (Choose two.)A . Link groupB . GatewayC . Virtual tunnelD . Virtual serverView AnswerAnswer: A,C Explanation: A link policy specifies the source/destination/service matches to which the policy applies. You apply a link policy to a link group or a...

March 19, 2019 No Comments READ MORE +

You are designing the CMP structure. Where should you define the pods?

You are designing the CMP structure. Where should you define the pods?A . Fault domainB . Private cloud VMC . Availability zoneD . Public cloud VMView AnswerAnswer: B

March 19, 2019 No Comments READ MORE +

Which technology should the organization consider for the southbound interface?

An organization leverages a multivendor network to sell connectivity services using Layer 3 VPN and VPLS. Where possible, the organization wants to use common APis across vendors, in order to automate the configuration of network services. Which technology should the organization consider for the southbound interface?A . BGP-LSB . OpFlexC...

March 19, 2019 No Comments READ MORE +

Controls to keep password sniffing attacks from compromising computer systems include which of the following?

Controls to keep password sniffing attacks from compromising computer systems include which of the following?A .  static and recurring passwords.B .  encryption and recurring passwords.C .  one-time passwords and encryption.D .  static and one-time passwords.View AnswerAnswer: C Explanation: To minimize the chance of passwords being captured one-time passwords would prevent...

March 19, 2019 No Comments READ MORE +

What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Serve1, that runs Windows Server 2016. A technician is testing the deployment of Credential Guard on Server1. You need to verify whether Credential Guard is enabled on Server1. What should you do?A . From a...

March 19, 2019 No Comments READ MORE +