In the Dual Stack lite solution, what is the function of the B4 component?

In the Dual Stack lite solution, what is the function of the B4 component?A . It acts as an endpoint for the IPv6 in IPv4 encapsulation and forwardingB . It decapsulates the tunneled IPV4 packets, translate the network address, and routes to the IPv4 networkC . It encapsulates the customer...

November 5, 2018 No Comments READ MORE +

You work for a company that distributes media for all ages

HOTSPOT You work for a company that distributes media for all ages. You are writing a function that assigns a rating based on a user’s age. The function must meet the following requirements: • Anyone 18 years old or older receives a rating of “A” • Anyone 13 or older,...

November 5, 2018 1 Comment READ MORE +

What is the first step that needs to be carried out to investigate wireless attacks?

What is the first step that needs to be carried out to investigate wireless attacks?A . Obtain a search warrantB . Identify wireless devices at crime sceneC . Document the scene and maintain a chain of custodyD . Detect the wireless connectionsView AnswerAnswer: A

November 5, 2018 No Comments READ MORE +

Which file is used to add a system-wide client option on an IBM Spectrum Protect client in a Windows environment?

Which file is used to add a system-wide client option on an IBM Spectrum Protect client in a Windows environment?A . dsmsys.optB . dsm.sysC . dsmopt.sysD . dsm.optView AnswerAnswer: D Explanation: Use the SET SUBFILE(Set subfile backup for client nodes) command to set up the server to allow clients to...

November 5, 2018 No Comments READ MORE +

Which common name should you use for the certificates on each server?

HOTSPOT Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2 that run Windows Server 2012 R2. The servers have the Hyper-V server role installed. A certification authority (CA) is available on the network. A virtual machine named vml.contoso.com is replicated from...

November 5, 2018 No Comments READ MORE +

What two ways can an administrator use to safeguard sensitive email content? (Choose two.)

What two ways can an administrator use to safeguard sensitive email content? (Choose two.)A . Implement the Unified Access Gateway.B . Configure the Device Enrollment Program.C . Implement SEG Proxy.D . Deploy email compliance policies.E . Deploy device token authentication.View AnswerAnswer: C,D

November 5, 2018 No Comments READ MORE +

Which security model introduces access to objects only through programs?

Which security model introduces access to objects only through programs?A .  The Biba modelB .  The Bell-LaPadula modelC .  The Clark-Wilson modelD .  The information flow modelView AnswerAnswer: C Explanation: In the Clark-Wilson model, the subject no longer has direct access to objects but instead must access them through programs...

November 5, 2018 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT You are the network security engineer for the Secure-X network. The company has recently detected Increase of traffic to malware Infected destinations. The Chief Security Officer deduced that some PCs in the internal networks are infected with malware and communicate with malware infected destinations. The CSO has tasked...

November 5, 2018 No Comments READ MORE +

For each feature, what should you implement?

HOTSPOT You have an on-premises Active Directory Domain Services domain. You are considering moving your infrastructure to Azure Active Directory. You need to describe the features that each directory service provides. For each feature, what should you implement? To answer, select the appropriate option from each list in the answer...

November 5, 2018 No Comments READ MORE +

What should you implement?

You have a database that is denormalized. Users make frequent changes to data in a primary table. You need to ensure that users cannot change the tables directly, and that changes made to the primary table also update any related tables. What should you implement?A . the COALESCE functionB ....

November 5, 2018 No Comments READ MORE +