Which network device does NTP authenticate?

Which network device does NTP authenticate?A . Only the time sourceB . Only the client deviceC . The firewall and the client deviceD . The client device and the time sourceView AnswerAnswer: A

October 1, 2018 No Comments READ MORE +

When you attempt to connect to a Cisco ASA with a default configuration, which username and password grants you full access?

An administrator installed a Cisco ASA that runs version 9.1. You are asked to configure the firewall through Cisco ASDM. When you attempt to connect to a Cisco ASA with a default configuration, which username and password grants you full access?A . admin / adminB . asaAdmin / (no password)C...

October 1, 2018 No Comments READ MORE +

Which option shows the correct traffic selectors for the child SA on the remote ASA, when the headquarter ASA initiates the tunnel?

Which option shows the correct traffic selectors for the child SA on the remote ASA, when the headquarter ASA initiates the tunnel?A . Local selector 192.168.33.0/0-192.168.33.255/65535 Remote selector 192.168.20.0/0-192.168.20.255/65535B . Local selector 192.168.33.0/0-192.168.33.255/65535 Remote selector 192.168.22.0/0-192.168.22.255/65535C . Local selector 192.168.22.0/0-192.168.22.255/65535 Remote selector 192.168.33.0/0-192.168.33.255/65535D . Local selector 192.168.33.0/0-192.168.33.255/65535 Remote selector 0.0.0.0/0...

October 1, 2018 No Comments READ MORE +

Which way to achieve these goals?

A network engineer wants to limit the EIGRP query scope to avoid high CPU and memory utilization on low-end routers as well as limiting the possibility of a stuck-in-active routing event between HQ and branch offices. Which way to achieve these goals?A . Configure different Autonomous System number per each...

October 1, 2018 No Comments READ MORE +

Which Windows PowerShell command should you run?

You deploy an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as the attribute store. Some users report that they fail to authenticate to the AD FS infrastructure. You discover that only users who run third-party web browsers experience issues. You need to ensure that...

October 1, 2018 No Comments READ MORE +

Which tool should you use?

You have a server named Server1 that runs Windows Server 2012 R2. When you install a custom Application on Server1 and restart the server, you receive the following error message: "The Boot Configuration Data file is missing some required information. File: BootBCD Error code: 0x0000034." You start Server1 by using...

October 1, 2018 No Comments READ MORE +

When configuring class of service, what would you use to allocate bandwidth to a forwarding class?

When configuring class of service, what would you use to allocate bandwidth to a forwarding class?A . Buffer depthB . Transmit rateC . BandwidthD . SpeedView AnswerAnswer: B

October 1, 2018 No Comments READ MORE +

Which supported and most efficient configuration would you recommend for this environment?

A company wants its x64 Linux backup data sent directly to ECS. Which supported and most efficient configuration would you recommend for this environment?A . Use a Networker storage node to receive x64 Linux NetWorker client data and send it to ECSB . Use a Cloud Boost appliance as a...

October 1, 2018 No Comments READ MORE +

Which of the following is best defined as an administrative declaration by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards?

Which of the following is best defined as an administrative declaration by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards?A .  CertificationB .  DeclarationC .  AuditD .  AccreditationView AnswerAnswer: D Explanation: Accreditation: is an administrative declaration by...

October 1, 2018 No Comments READ MORE +

What is the best solution for this environment and these needs?

Refer to the exhibit. All connections between switches are 10 Gbps. Switch is an Intelligent Resilient Framework (IRF) group with two member. Switch2 is an IRF group with two members. Switch1 and Switch2 route all traffic. A network architect is designing a solution for a finance company. One of the...

October 1, 2018 No Comments READ MORE +