Which of the following is NOT a system-sensing wireless proximity card?
Which of the following is NOT a system-sensing wireless proximity card?A . magnetically striped cardB . passive deviceC . field-powered deviceD . transponderView AnswerAnswer: A Explanation: Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, page 342.
Which two possible sources can you use to achieve this goal?
You have a server named Server1 that runs a Server Core Installation of Windows Server 2012 R2 Datacenter. You have a WIM file that contains the four images of Windows Server 2012 R2 as shown in the Images exhibit. (Click the Exhibit button.) You review the installed features on Server1...
Which two actions should you perform?
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Active Directory Certificate Services server role installed and is configured as an enterprise certification authority (CA). You need to ensure that all of the users...
Cisco Unified Mobile Connect has been enabled, but users are not able to switch an in-progress call from their mobile phone to their desk phone. You find out that the Resume softkey option does not appear on the desk phone after users hang up the call on their mobile phone. What do you do to resolve this issue?
Cisco Unified Mobile Connect has been enabled, but users are not able to switch an in-progress call from their mobile phone to their desk phone. You find out that the Resume softkey option does not appear on the desk phone after users hang up the call on their mobile phone....
What should you do?
You are a systems administrator for your company. The company has employees who work remotely by using a virtual private network (VPN) connection from their computers, which run Windows 8 Pro. These employees use an application to access the company intranet database servers. The company recently decided to distribute the...
Which two security techniques are important to implement a secured management network that is used to access the management plane of a Cisco ARC cluster? (Choose two.)
Which two security techniques are important to implement a secured management network that is used to access the management plane of a Cisco ARC cluster? (Choose two.)A . MPPB . NATC . ip filterD . ACLsE . route mapsView AnswerAnswer: AD Explanation: The Management Plane Protection (MPP) feature in Cisco...
How would you satisfy this requirement?
Your network provider supports multicast traffic but your provider network does not. You want to allow multicast hosts outside of your network to receive multicast traffic sourced within your network. How would you satisfy this requirement?A . Use MSDP peering with your provider.B . Use AutoVPN to connect to the...
On Switch 5, which command would configure VLAN 5 as root?
On Switch 5, which command would configure VLAN 5 as root?A . switch5#spanning-tree vlan 5 priority 0B . switch5(config)#spanning-tree vlan 5 priority 61440C . switch5(config)#spanning-tree vlan 5 rootD . switch5(config)#spanning-tree vlan 5 priority 0E . switch5(config-if)#spanning-tree rootguardView AnswerAnswer: D
What should you do?
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. You are creating a central access rule named TestFinance that will be used to grant members of the Authenticated users group access to a folder stored on a Microsoft SharePoint Server 2013 server. You...
In which two ways do NSF and BFD work together when different hardware platforms are compared?
A company plans to include Nonstop Forwarding and Bidirectional Forwarding Detection as a part of their network redundancy plan. In which two ways do NSF and BFD work together when different hardware platforms are compared? (Choose two.)A . During supervisor engine or routing engine failover, the NSF feature will always...