Which technology allows remote networks to be connected via site-to-site tunnels?

Which technology allows remote networks to be connected via site-to-site tunnels?A . IPsec VPNB . AnyConnect VPNC . SSL VPND . EasyConnect VPNView AnswerAnswer: A

September 14, 2018 No Comments READ MORE +

Which security feature can help prevent spoofed packets on the network?

Which security feature can help prevent spoofed packets on the network?A . uRPFB . ACLsC . DAID . DHCP spoofingView AnswerAnswer: A

September 14, 2018 No Comments READ MORE +

Both the GE1/0/1 and GE1/0/2 ports of the firewall belong to the DMZ. If the area connected to GE1/0/1 can access the area connected to GE1/0/2, which of the following is correct?

Both the GE1/0/1 and GE1/0/2 ports of the firewall belong to the DMZ. If the area connected to GE1/0/1 can access the area connected to GE1/0/2, which of the following is correct?A .  Need to configure the security policy from Local to DMZB .  No need to do any configurationC .  Need to configure an interzone security policyD .  Need to configure security policy from DMZ to local View...

September 14, 2018 No Comments READ MORE +

Which two tools can you use to achieve the goal?

You have a computer that has a local printer. You need to share the printer. Which two tools can you use to achieve the goal? Each correct answer presents a complete solution.A . net share from a command promptB . Devices and Printers from Control PanelC . Set-PrintConfiguration from Windows...

September 14, 2018 No Comments READ MORE +

What are the peripheral variables in the Set Enterprise Call Info step related to?

What are the peripheral variables in the Set Enterprise Call Info step related to?A . call variablesB . custom variablesC . script parameters that are passed from the application configurationD . ECC variablesView AnswerAnswer: A

September 14, 2018 No Comments READ MORE +

How can that be accomplished?

An environment has twenty dispatchers. The administrator wants to change one property to the same value for all dispatchers. How can that be accomplished?A . This can be accomplished if all dispatchers are put inside a folder.B . This can be accomplished by changing the desired property for the configuration.C...

September 14, 2018 No Comments READ MORE +

Which of the following describes a logical form of separation used by secure computing systems?

Which of the following describes a logical form of separation used by secure computing systems?A .  Processes use different levels of security for input and output devices.B .  Processes are constrained so that each cannot access objects outside its permitted domain.C .  Processes conceal data and computations to inhibit access...

September 14, 2018 No Comments READ MORE +

A user comes to you and wants access to Amazon CloudWatch but only wants to monitor a specific LoadBalancer. Is it possible to give him access to a specific set of instances or a specific LoadBalancer?

A user comes to you and wants access to Amazon CloudWatch but only wants to monitor a specific LoadBalancer. Is it possible to give him access to a specific set of instances or a specific LoadBalancer?A .  No because you can't use IAM to control access to CloudWatch data for specific...

September 14, 2018 No Comments READ MORE +

After the network has converged, what type of messaging, if any, occurs between R3 and R4?

After the network has converged, what type of messaging, if any, occurs between R3 and R4? A . No messages are exchangedB . Hellos are sent every 10 seconds.C . The full database from each router is sent every 30 seconds.D . The routing table from each router is sent...

September 14, 2018 No Comments READ MORE +

On Cisco IOS devices, which IS-IS feature reduces the convergence time for prefixes designated as high priority?

On Cisco IOS devices, which IS-IS feature reduces the convergence time for prefixes designated as high priority?A . iSPFB . advertise passive onlyC . prefix prioritizationD . Fast-ForwardingView AnswerAnswer: C

September 14, 2018 No Comments READ MORE +