Which of the following options would you consider?

You are designing an intrusion detection prevention (IDS/IPS) solution for a customer web application in a single VPC. You are considering the options for implementing lOS IPS protection for traffic coming from the Internet. Which of the following options would you consider? (Choose 2 answers)A . Implement IDS/IPS agents on each Instance running In...

January 7, 2019 No Comments READ MORE +

What should you do?

Your network contains an Active Directory domain named contoso.com. You open Group Policy Management as shown in the exhibit. (Click the Exhibit button.) You discover that some of the settings configured in the A1 Group Policy object (GPO) fail to apply to the users in the OU1 organizational unit (OU)....

January 7, 2019 No Comments READ MORE +

You have a database named Sales that contains the following database tables: Customer, Order, and Products

HOTSPOT You have a database named Sales that contains the following database tables: Customer, Order, and Products. The Products table and the Order table are shown in the following diagram. The customer table includes a column that stores the data for the last order that the customer placed. You plan...

January 7, 2019 No Comments READ MORE +

Which of the following classes is the first level (lower) defined in the TCSEC (Orange Book) as mandatory protection?

Which of the following classes is the first level (lower) defined in the TCSEC (Orange Book) as mandatory protection?A .  BB .  AC .  CD .  DView AnswerAnswer: A Explanation: B level is the first Mandatory Access Control Level. First published in 1983 and updated in 1985, the TCSEC, frequently referred...

January 7, 2019 No Comments READ MORE +

At run-time, conditions may occur that produce warnings, but not errors. How can you easily look for these warnings?

At run-time, conditions may occur that produce warnings, but not errors. How can you easily look for these warnings? A. Check STATUS for >0. B. Check SQLCA.SQLAWARN for specific warning numbers. C. Check SQLCODE, if set to >0, examine contents of each SQLCA.SQLAWARN component. D. Check SQLCA.SQLAWARN[1], if set to...

January 7, 2019 No Comments READ MORE +

Which of the following should be configured?

A company only wants preapproved laptops to be able to connect to a wireless access point. Which of the following should be configured?A . SSID disableB . ACL rulesC . WPA encryptionD . MAC filteringView AnswerAnswer: D

January 7, 2019 No Comments READ MORE +

By default, the OSPF port cost is related to the bandwidth of the port. The calculation formula is bandwidth-reference/bandwith. The port cost can only be calculated by OSPF and cannot be changed manually.

By default, the OSPF port cost is related to the bandwidth of the port. The calculation formula is bandwidth-reference/bandwith. The port cost can only be calculated by OSPF and cannot be changed manually.A . TrueB . FalseView AnswerAnswer: B

January 7, 2019 No Comments READ MORE +

You are setting up a Windows 10 Enterprise computer

HOTSPOT You are setting up a Windows 10 Enterprise computer. The computer’s network connections are shown in the Network connections exhibit. (Click the Exhibit button.) The computer’s network settings are shown in the Network Settings exhibit. (Click the Exhibit button.) Advanced TCP/IP settings are shown in the Advanced TCP/IP Settings...

January 7, 2019 No Comments READ MORE +

What is the standard or basic collection of NTFS permissions?

What is the standard or basic collection of NTFS permissions?A . Read and execute, read, write, full control, modify, list folder contentsB . Change permissions, read permissions, write permissionsC . Read attributes, list folder/read data, traverse folder/execute fileD . Create files/write data, create folders/append data, take ownershipView AnswerAnswer: A Explanation:...

January 7, 2019 No Comments READ MORE +

What should the administrator do to discover the cluster in Airwave?

A network has ArubaOS switches and an Aruba Instant cluster with IP addresses on 10.1.255.0/24. The network administrator wants to manage the devices in Aruba Airwave. The administrator uses the SNMP credentials configured on the switches to create a scan set for 10.1.255.0/24. The scan discovers the switches but not...

January 7, 2019 No Comments READ MORE +