Which two tasks can be performed by analyzing the logs of a traditional stateful firewall? (Choose two.)

Which two tasks can be performed by analyzing the logs of a traditional stateful firewall? (Choose two.)A . Confirm the timing of network connections differentiated by the TCP 5-tupleB . Audit the applications used within a social networking web site.C . Determine the user IDs involved in an instant messaging...

November 5, 2018 No Comments READ MORE +

What are two design advantages to using virtual port channel? (Choose two.)

What are two design advantages to using virtual port channel? (Choose two.)A . enhanced system availability through multiple systemsB . reduced Spanning Tree Protocol convergence timeC . loop management without use of Spanning Tree ProtocolD . ability to use Spanning Tree Protocol blocked ports to forward trafficE . enhanced ability...

November 5, 2018 No Comments READ MORE +

What should you implement?

You have a database that is denormalized. Users make frequent changes to data in a primary table. You need to ensure that users cannot change the tables directly, and that changes made to the primary table also update any related tables. What should you implement?A . the COALESCE functionB ....

November 5, 2018 No Comments READ MORE +

What should you recommend?

You have an Azure Cosmos DB account named Account1 that uses the SQI. API Account1 contains a database named DB1. DB1 contains a collection named Coll. The default TTL value for Coll1 is-1. You plan to develop an application that will include a Cosmos DB trigger in an Azure function....

November 5, 2018 No Comments READ MORE +

What should you do?

You administer an Azure Storage account with a blob container. You enable Storage account logging for read, write and delete requests. You need to reduce the costs associated with storing the logs. What should you do?A . Execute Delete Blob requests over https.B . Create an export job for your...

November 5, 2018 No Comments READ MORE +

Which online service allows you to store and retrieve files over the Internet?

Which online service allows you to store and retrieve files over the Internet?A . Windows Future StorageB . Windows Live SkyDriveC . Windows Media CenterD . Windows Storage ServerView AnswerAnswer: B

November 5, 2018 No Comments READ MORE +

Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?

Which of the following is NOT an element of VPN Simplified Mode and VPN Communities?A . “Encrypt” action in the Rule BaseB . Permanent TunnelsC . “VPN” column in the Rule BaseD . Configuration checkbox “Accept all encrypted traffic”View AnswerAnswer: A Explanation: Migrating from Traditional Mode to Simplified Mode To...

November 5, 2018 No Comments READ MORE +

Which option allows a file to be extracted from a TCP stream within Wireshark?

Which option allows a file to be extracted from a TCP stream within Wireshark?A . File > Export ObjectsB . Analyze > ExtractC . Tools > Export > TCPD . View > ExtractView AnswerAnswer: A

November 5, 2018 No Comments READ MORE +

Which of the following best describes the state of architecture artifacts as a project progresses through ADM Phases A to D?

Which of the following best describes the state of architecture artifacts as a project progresses through ADM Phases A to D?A . The artifacts are transformed into solution architecturesB . The artifacts become increasingly product focusedC . The artifacts become increasingly generic and re-usableD . The artifacts evolve from generic...

November 5, 2018 No Comments READ MORE +

“Being good at observation” and “keeping suspicion” can help us better identify security threats in the online world.

“Being good at observation” and “keeping suspicion” can help us better identify security threats in the online world.A . TrueB . FalseView AnswerAnswer: A

November 5, 2018 No Comments READ MORE +