Which of the following options would you consider?
You are designing an intrusion detection prevention (IDS/IPS) solution for a customer web application in a single VPC. You are considering the options for implementing lOS IPS protection for traffic coming from the Internet. Which of the following options would you consider? (Choose 2 answers)A . Implement IDS/IPS agents on each Instance running In...
What should you do?
Your network contains an Active Directory domain named contoso.com. You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.) You discover that some of the settings configured in the A1 Group Policy object (GPO) fail to apply to the users in the OU1 organizational unit (OU)....
You have a database named Sales that contains the following database tables: Customer, Order, and Products
HOTSPOT You have a database named Sales that contains the following database tables: Customer, Order, and Products. The Products table and the Order table are shown in the following diagram. The customer table includes a column that stores the data for the last order that the customer placed. You plan...
Which of the following classes is the first level (lower) defined in the TCSEC (Orange Book) as mandatory protection?
Which of the following classes is the first level (lower) defined in the TCSEC (Orange Book) as mandatory protection?A . BB . AC . CD . DView AnswerAnswer: A Explanation: B level is the first Mandatory Access Control Level. First published in 1983 and updated in 1985, the TCSEC, frequently referred...
At run-time, conditions may occur that produce warnings, but not errors. How can you easily look for these warnings?
At run-time, conditions may occur that produce warnings, but not errors. How can you easily look for these warnings? A. Check STATUS for >0. B. Check SQLCA.SQLAWARN for specific warning numbers. C. Check SQLCODE, if set to >0, examine contents of each SQLCA.SQLAWARN component. D. Check SQLCA.SQLAWARN[1], if set to...
Which of the following should be configured?
A company only wants preapproved laptops to be able to connect to a wireless access point. Which of the following should be configured?A . SSID disableB . ACL rulesC . WPA encryptionD . MAC filteringView AnswerAnswer: D
By default, the OSPF port cost is related to the bandwidth of the port. The calculation formula is bandwidth-reference/bandwith. The port cost can only be calculated by OSPF and cannot be changed manually.
By default, the OSPF port cost is related to the bandwidth of the port. The calculation formula is bandwidth-reference/bandwith. The port cost can only be calculated by OSPF and cannot be changed manually.A . TrueB . FalseView AnswerAnswer: B
You are setting up a Windows 10 Enterprise computer
HOTSPOT You are setting up a Windows 10 Enterprise computer. The computer’s network connections are shown in the Network connections exhibit. (Click the Exhibit button.) The computer’s network settings are shown in the Network Settings exhibit. (Click the Exhibit button.) Advanced TCP/IP settings are shown in the Advanced TCP/IP Settings...
What is the standard or basic collection of NTFS permissions?
What is the standard or basic collection of NTFS permissions?A . Read and execute, read, write, full control, modify, list folder contentsB . Change permissions, read permissions, write permissionsC . Read attributes, list folder/read data, traverse folder/execute fileD . Create files/write data, create folders/append data, take ownershipView AnswerAnswer: A Explanation:...
What should the administrator do to discover the cluster in Airwave?
A network has ArubaOS switches and an Aruba Instant cluster with IP addresses on 10.1.255.0/24. The network administrator wants to manage the devices in Aruba Airwave. The administrator uses the SNMP credentials configured on the switches to create a scan set for 10.1.255.0/24. The scan discovers the switches but not...