Which of the following network-based security controls should the engineer consider implementing?
Malicious traffic from an internal network has been detected on an unauthorized port on an application server. Which of the following network-based security controls should the engineer consider implementing?A . ACLsB . HIPSC . NATD . MAC filteringView AnswerAnswer: A
The Cisco AnyConnect client is unable to download an updated user profile from the ASA headend using IKEv2. What is the most likely cause of this problem?
The Cisco AnyConnect client is unable to download an updated user profile from the ASA headend using IKEv2. What is the most likely cause of this problem?A . User profile updates are not allowed with IKEv2.B . IKEv2 is not enabled on the group policy.C . A new profile must...
What is the result?
A network engineer executes the “ipv6 flowset” command. What is the result?A . Flow-label marking in 1280-byte or larger packets is enabled.B . Flow-set marking in 1280-byte or larger packets is enabledC . IPv6 PMTU is enabled on the router.D . IPv6 flow control is enabled on the router.View AnswerAnswer:...
What should you configure from User Configuration in GPO1?
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 that runs Windows Server 2012 R2. All client computers run Windows 8 Enterprise. DC1 contains a Group Policy object (GPO) named GPO1. You need to deploy a VPN connection to all users. What...
Which state by default for port security is set in a switch?
Which state by default for port security is set in a switch?A . enableB . disableC . onD . offView AnswerAnswer: B
What describes how the 802.1Q protocol lactates the transmission of multiple Layer 2 networks on a single link?
What describes how the 802.1Q protocol lactates the transmission of multiple Layer 2 networks on a single link?A . adds 802.1Q tag information between the source MAC address and the Ether Type/Length fieldsB . encapsulates the frame inside an 802.1Q tunnelC . adds 802.1Q tag information between the preamble and...
Which two protocols could be used during this communication?
The network administrator is using a Windows PC application that is called putty.exe for remote communication to a switch for network troubleshooting. Which two protocols could be used during this communication? (Choose two).A . SNMPB . HTTPC . TelnetD . RMONE . SSHView AnswerAnswer: CE
What should you do?
Your company has a standard power scheme for the sales team. You are replacing a laptop for a sales associate. You import the power scheme onto the new laptop. You need to apply the power scheme. What should you do?A . Modify the power scheme under Power and Sleep settings.B...
Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.)
Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.)A . Token ringB . EthernetC . Dial-upD . Leased lineView AnswerAnswer: C, D
What should you create?
You administer a Microsoft SQL Server 2012 database named Contoso on a server named Server01. You need to be notified immediately when fatal errors occur on Server01. What should you create?A . An AlertB . A Server Audit SpecificationC . An Extended Event sessionD . A Resource PoolE . A...