Which statement about IOS accounting is true?

Which statement about IOS accounting is true?A . A named list of AAA methods must be defined.B . A named list of accounting methods must be defined.C . Authorization must be configured before accounting.D . A named list of tracking methods must be defined.View AnswerAnswer: C

September 25, 2018 No Comments READ MORE +

Which process is responsible for low risk, frequently occurring, low cost changes?

Which process is responsible for low risk, frequently occurring, low cost changes?A . Demand managementB . Incident managementC . Release and deployment managementD . RequestfulfillmentView AnswerAnswer: D

September 25, 2018 1 Comment READ MORE +

Which configuration provides the highest performance level to Virtual Extensible LAN?

Which configuration provides the highest performance level to Virtual Extensible LAN?A . VxLAN in unicast mode with VxLAN TSO offload in Cisco UCSB . VxLAN in multicast mode with MAC distributionC . VxLAN in multicast mode with VxLAN TSO offload in Cisco UCSD . VxLAN in unicast mode with MAC...

September 25, 2018 No Comments READ MORE +

Which two empty recovery log directories must be defined before configuration of the IBM Spectrum Protect server instance? (Select two.)

Which two empty recovery log directories must be defined before configuration of the IBM Spectrum Protect server instance? (Select two.)A . Failover log directoryB . Mirror log directoryC . Active log directoryD . DB2 transaction log directoryE . Archive log directoryView AnswerAnswer: C,E Explanation: IBM Spectrum Protect Configuration best practicesinclude:...

September 25, 2018 No Comments READ MORE +

Which one of the following does TOGAF state is an objective for Phase A: Architecture Vision?

Which one of the following does TOGAF state is an objective for Phase A: Architecture Vision?A . To create an implementation and migration strategyB . To establish an architecture change management processC . To priorities work packages and projectsD . To validate the business principles, goals, drivers and key performance...

September 25, 2018 No Comments READ MORE +

A customer wants to implement a policy on a guest WLAN, in which clients must accept the company wireless policy and enter an email address to access the guest network. The company does not have access to RADIUS servers and wants the WLAN to use open Layer 2 security. Which Layer 3 security web policy must be enabled to meet these criteria?

A customer wants to implement a policy on a guest WLAN, in which clients must accept the company wireless policy and enter an email address to access the guest network. The company does not have access to RADIUS servers and wants the WLAN to use open Layer 2 security. Which...

September 25, 2018 No Comments READ MORE +

The Cisco Email Security Appliance can be managed with both local and external users of different privilege levels. What three external modes of authentication are supported? (Choose three.)

The Cisco Email Security Appliance can be managed with both local and external users of different privilege levels. What three external modes of authentication are supported? (Choose three.)A . LDAP authenticationB . RADIUS AuthenticationC . TACASD . SSH host keysE . Common Access Card AuthenticationF . RSA Single use tokensView...

September 25, 2018 No Comments READ MORE +

Which of the following access control models requires defining classification for objects?

Which of the following access control models requires defining classification for objects?A .  Role-based access controlB .  Discretionary access controlC .  Identity-based access controlD .  Mandatory access controlView AnswerAnswer: D Explanation: With mandatory access control (MAC), the authorization of a subject's access to an object is dependant upon labels, which indicate...

September 25, 2018 No Comments READ MORE +

In the CIFS shared migration solution, if the local user group ACL information exists in the file system, the operations involved in the migration process are: (Multiple choice)

In the CIFS shared migration solution, if the local user group ACL information exists in the file system, the operations involved in the migration process are: (Multiple choice)A . Collect source storage local user group name and SIDB . Target stores local user groups with the same nameC . Collect...

September 25, 2018 2 Comments READ MORE +