Which of the following is the WEAKEST authentication mechanism?

Which of the following is the WEAKEST authentication mechanism?A .  PassphrasesB .  PasswordsC .  One-time passwordsD .  Token devicesView AnswerAnswer: B Explanation: Most of the time users usually choose passwords which can be guessed , hence passwords is the BEST answer out of the choices listed above. The following answers...

March 17, 2019 No Comments READ MORE +

Which of the following FortiGate configuration tasks will create a route in the policy route table? (Choose two.)

Which of the following FortiGate configuration tasks will create a route in the policy route table? (Choose two.)A . Static route created with a Named Address objectB . Static route created with an Internet Services objectC . SD-WAN route created for individual member interfacesD . SD-WAN rule created to route...

March 17, 2019 1 Comment READ MORE +

How would you adjust the design to improve convergence on the network?

Refer to the exhibit. How would you adjust the design to improve convergence on the network?A . Add an intra-POP link between routers 1A and 1B, and enable IP LFA FRC . Use an IP SLA between the end stations to detect path failures.D . Enable SSO-NSF on routers 1A...

March 17, 2019 No Comments READ MORE +

When implementing a global dial plan, which digit manipulation feature in CUCM does Cisco recommend for adding +1 to all outbound calls?

When implementing a global dial plan, which digit manipulation feature in CUCM does Cisco recommend for adding +1 to all outbound calls?A . Called party transformation.B . Calling party transformation.C . Translation pattern.D . External phone mask.View AnswerAnswer: A

March 17, 2019 No Comments READ MORE +

Which IBM Storwize V7000 Unified systems feature addresses this requirement?

A customer wants to purchase two IBM Storwize V7000 Unified systems that will be located at separate facilities and needs to share file data. Which IBM Storwize V7000 Unified systems feature addresses this requirement?A . Metro / Global MirrorB . Active Cloud EngineC . Easy Tier for file systemD ....

March 17, 2019 No Comments READ MORE +

Which tool should be used?

A customer wants to replace its legacy block storage environment with a new IBM FlashSystem A9000R soluton and is concerned about properly estimating consolidated storage capacity after deduplication and compression savings. Which tool should be used?A . IBM ComprestimatorB . IBM Storage Tier Advisor ToolC . IBM Data Reduction Estimator...

March 17, 2019 No Comments READ MORE +

An organization uses IP address block 203.0.113.0/24 on its internal network. At the border router, the network administrator sets up rules to deny packets with a source address in this subnet from entering the network, and to deny packets with a destination address in this subnet from leaving the network. Which of the following is the administrator attempting to prevent?

An organization uses IP address block 203.0.113.0/24 on its internal network. At the border router, the network administrator sets up rules to deny packets with a source address in this subnet from entering the network, and to deny packets with a destination address in this subnet from leaving the network....

March 17, 2019 No Comments READ MORE +

Which are three Cisco ISE use cases? (Choose three.)

Which are three Cisco ISE use cases? (Choose three.)A . BYODB . AssuranceC . MonitoringD . Security Incident and Event ManagementE . Access ControlF . SegmentationView AnswerAnswer: AEF

March 17, 2019 No Comments READ MORE +

What should the Administrator do to ensure that each person has the correct access?

At Universal Containers, the sharing model is set to private. Sales operations, legal, and accounting users all have the Standard User profile. A person from each department will assist the Account Executive in the sales process. The Sales operations and Accounting Reps need read/write access and legal needs read-only access...

March 17, 2019 No Comments READ MORE +

What can be done to correct this issue?

During instant clone desktop pool creation, the following error message is displayed: What can be done to correct this issue?A . Recompose the instant clone pool.B . Rebalance the instant clone pool.C . Disable and then enable provisioning.D . Change the number of desktops deployed within the instant clone pool.View...

March 17, 2019 No Comments READ MORE +