Related to information security, the prevention of the intentional or unintentional unauthorized disclosure of contents is which of the following?
Related to information security, the prevention of the intentional or unintentional unauthorized disclosure of contents is which of the following?A . ConfidentialityB . IntegrityC . AvailabilityD . capabilityView AnswerAnswer: A Explanation: Confidentiality is the prevention of the intentional or unintentional unauthorized disclosure of contents. Source: KRUTZ, Ronald L. & VINES,...
Which protocol is the Cisco proprietary implementation of FHRP?
Which protocol is the Cisco proprietary implementation of FHRP?A . HSRPB . VRRPC . GLBPD . CARPView AnswerAnswer: A
Which statement best describes the role of a DC agent in an FSSO DC agent mode solution?
Which statement best describes the role of a DC agent in an FSSO DC agent mode solution? Response:A . Captures the logon events and forwards them to FortiGate.B . Captures the logon events and forwards them to the collector agent.C . Captures the logon and logoff events and forwards them...
What are the three types of metrics that an organization shouldcollect to support continual service improvement (CSI)?
What are the three types of metrics that an organization shouldcollect to support continual service improvement (CSI)?A . Return on investment (ROI), value on investment (VOI), qualityB . Strategic, tactical and operationalC . Critical success factors (CSFs), key performance indicators (KPIs), activitiesD . Technology, process and serviceView AnswerAnswer: D
Which of the following is less likely to be included in the change control sub-phase of the maintenance phase of a software product?
Which of the following is less likely to be included in the change control sub-phase of the maintenance phase of a software product?A . Estimating the cost of the changes requestedB . Recreating and analyzing the problemC . Determining the interface that is presented to the userD . Establishing the...
ABC Company is planning a point-to-multipoint outdoor bridge deployment with standalone (autonomous) 802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge Implementation as the 802.1X Authenticator?
ABC Company is planning a point-to-multipoint outdoor bridge deployment with standalone (autonomous) 802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux-based RADIUS server will be used for authentication. What device in the bridge Implementation as the 802.1X Authenticator?A . All non-root bridgesB . The root bridgeC ....
Which protocol allows Microsoft Windows servers to access storage on ECS?
Which protocol allows Microsoft Windows servers to access storage on ECS?A . HDFSB . NFSV3C . CIFSD . SMBy3View AnswerAnswer: C
Which components allow you to reset a VPN tunnel?
Which components allow you to reset a VPN tunnel?A . vpn tucommand or SmartView monitorB . delete vpn ike saor vpn she11 commandC . vpn tunnelutilor delete vpn ike sa commandD . SmartView monitor onlyView AnswerAnswer: D
Which operating system do Juniper Networks MX Series routers use?
Which operating system do Juniper Networks MX Series routers use?A . IOSB . MX-OSC . UNIXD . Junos OSView AnswerAnswer: D
In Cisco MPLS TE implementations, what can cause the tunnel bandwidth to adjust automatically based on the traffic load in the tunnel?
In Cisco MPLS TE implementations, what can cause the tunnel bandwidth to adjust automatically based on the traffic load in the tunnel?A . fast rerouteB . admin weightC . autobandwidthD . bandwidth subpoolView AnswerAnswer: C