Which three statements are characteristics of DHCP Spoofing? (choose three)
Which three statements are characteristics of DHCP Spoofing? (choose three)A . Arp PoisoningB . Modify Traffic in transitC . Used to perform man-in-the-middle attackD . Physically modify the network gatewayE . Protect the identity of the attacker by masking the DHCP addressF . can access most network devicesView AnswerAnswer: ABC
In 802.1Q tag header, how many bit domain is VLAN ID? and how many VLAN can indicate in total?
In 802.1Q tag header, how many bit domain is VLAN ID? and how many VLAN can indicate in total?A . 4;16B . 8;256C . 10;1024D . 12;4096View AnswerAnswer: D
Which option is the correct CIDR notation for 192.168.0.0 subnet 255.255.255.252?
Which option is the correct CIDR notation for 192.168.0.0 subnet 255.255.255.252?A . 30B . 31C . 32D . 33View AnswerAnswer: A
Which cmdlet should you run?
You have a DNS server named Server1 that runs Windows Server 2016. Server1 has an Active Directory-integrated zone named adatum.com. All client computers run Windows 10. You recently encountered unexpected responses to DNS client queries in the adatum.corn zone. You need to log all the records written to the zone....
What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) modulation method in IEEE 802.11 WLANs?
What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) modulation method in IEEE 802.11 WLANs?A . OFDM was used by Frequency Hopping Spread Spectrum (FHSS) PHY devices.B . OFDM was first introduced in 802. 11a and is used by the ERP, HT and VHT PHYs as...
Which two actions are initiate by the policy when a new server starts?
A server discovery policy is defined in Cisco UCS Manager. Which two actions are initiate by the policy when a new server starts? (Choose two)A . The scrub policy is applied to the server. if configuredB . The inventory of the server is analyzedC . A service profile is created...
Which password types are encrypted?
Which password types are encrypted?A . SSHB . TelnetC . enable secretD . enable passwordView AnswerAnswer: C
You deploy Office 365. All the members of a team named Sales have full access to a shared mailbox named Sales. You enable auditing for all shared mailboxes. From the Sales mailbox, an email message that contains inappropriate content is sent. You need to identify which user sent the message. What should you do?
You deploy Office 365. All the members of a team named Sales have full access to a shared mailbox named Sales. You enable auditing for all shared mailboxes. From the Sales mailbox, an email message that contains inappropriate content is sent. You need to identify which user sent the message....
In order to create an object storage where each object would be stored only once, you may use which of the following? (Choose 2)
In order to create an object storage where each object would be stored only once, you may use which of the following? (Choose 2)A . SplFixedArrayB . SplObjectStorageC . SplStringD . spl_object_hash E: spl_same_objectView AnswerAnswer: B, D
What are possible Etherchannel load balancing mechanism based on layer 3?
What are possible Etherchannel load balancing mechanism based on layer 3?A . Mac sourceB . Mac source-destinationC . Ip SourceD . IP Source-destinationE . Mac destinationView AnswerAnswer: CD