Which of the following best describes the port on a laptop that is used to connection to an Ethernet port on a Cisco Switch?
Which of the following best describes the port on a laptop that is used to connection to an Ethernet port on a Cisco Switch?A . RJ-45B . RJ-11C . VGAD . DVIE . DB-9View AnswerAnswer: A
What should you do from Active Directory Users and Computers?
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Remote Access server role installed. A user named User1 must connect to the network remotely. The client computer of User1 requires Challenge Handshake Authentication Protocol...
What are two characteristics of the multihomed customers to service providers connection option? (Choose two.)
What are two characteristics of the multihomed customers to service providers connection option? (Choose two.)A . Multihomed customers must use a private AS number.B . The traffic load can be shared for different destination networks between service providers.C . Multihomed customers must receive a full routing table from the service...
Two new applications have been added to a working server. The server response is now very slow. An appropriate plan of action is to:
Two new applications have been added to a working server. The server response is now very slow. An appropriate plan of action is to:A . uninstall each server application and reinstall the two new applications.B . install another application to see if this improves the server response time.C . install...
A security analyst has been asked to develop a quantitative risk analysis and risk assessment for the company's online shopping application. Based on heuristic information from the Security Operations Center (SOC), a Denial of Service Attack (DoS) has been successfully executed 5 times a year. The Business Operations department has determined the loss associated to each attack is $40,000. After implementing application caching, the number of DoS attacks was reduced to one time a year. The cost of the countermeasures was $100,000. Which of the following is the monetary value earned during the first year of operation?
A security analyst has been asked to develop a quantitative risk analysis and risk assessment for the company's online shopping application. Based on heuristic information from the Security Operations Center (SOC), a Denial of Service Attack (DoS) has been successfully executed 5 times a year. The Business Operations department has...
Which option in the Theme Optimization Analyzer can be used to diagnose problems with a customer’s theme for IBM WebSphere Portal 8.5?
Which option in the Theme Optimization Analyzer can be used to diagnose problems with a customer’s theme for IBM WebSphere Portal 8.5?A . UtilitiesB . Validation reportC . Examine modulesD . Examine Page profilesView AnswerAnswer: B Explanation: https://greenhouse.lotus.com/plugins/plugincatalog.nsf/assetDetails.xsp?action=editDocum ent&do cumentId=6F106EACA45124D685257B9400682966 (new with version 2.0)
Which of the following should the administrator perform?
An administrator is tasked to reduce the company’s datacenter power utilization. Currently there are 500 physical servers in the datacenter and 600 virtual servers with five additional available host servers. Which of the following should the administrator perform?A . Migrate servers using V2V technologyB . Perform an offline migration of...
For which reason will this router drop all traffic that is destined to the 1.1.1.0/24 network?
Refer to the show command output in the exhibit. For which reason will this router drop all traffic that is destined to the 1.1.1.0/24 network?A . The 1.1.1.0/24 route is not synchronized.B . The BGP next hop for reaching the 1.1.1.0/24 network is not reachable.C . The metric of the...
Which of the following BEST describes the purpose of access management?
Which of the following BEST describes the purpose of access management?A . To provide a channel for users to request and receive standard servicesB . Providesthe rights for users to be able to use a service or group of servicesC . To prevent problems and resulting Incidents from happeningD ....
Which of the following would be the best reason for separating the test and development environments?
Which of the following would be the best reason for separating the test and development environments?A . To restrict access to systems under test.B . To control the stability of the test environment.C . To segregate user and development staff.D . To secure access to systems under development.View AnswerAnswer: B Explanation:...