Which of the following protocols can you use for secure administrative access to a FortiGate?
Which of the following protocols can you use for secure administrative access to a FortiGate? (Choose two.) Response:A . HTTPSB . TelnetC . SSHD . FortiTelemetryView AnswerAnswer: AC
When creating a route pattern, which two of these options should you avoid? (Choose two)
When creating a route pattern, which two of these options should you avoid? (Choose two)A . Lowercase characters, such as a, b, cB . Wildcards.C . Numbers.D . Uppercase characters, such as A, B,F . Spaces.G . Special characters andescape sequences, such as @ and +.View AnswerAnswer: A,E
Which three options are capabilities of the Cisco Nexus 7000 Series Supervisor Module? (Choose three.)
Which three options are capabilities of the Cisco Nexus 7000 Series Supervisor Module? (Choose three.)A . hardware forwarding on the supervisor moduleB . fully decoupled control plane and data plane with no forwarding on the supervisor moduleC . Sup2 requires Cisco NX-OS 5.1 or later.D . Sup2 requires Cisco NX-OS...
What are two forms of SSL VPN? (Choose two.)
What are two forms of SSL VPN? (Choose two.)A . port forwardingB . Full Tunnel ModeC . Cisco IOS WebVPND . Cisco AnyConnectView AnswerAnswer: CD
Which two statements are correct regarding the multicast operations on the router that is the RP?
Which two statements are correct regarding the multicast operations on the router that is the RP? (Choose two.)A . lt is using IGMPv3B . 1he IGMP query interval is set to 125 seconds c. It is using the IPv4 unicast routing table to perform the RPF checksC . static multicast routes...
What should the user do to ensure that the EC2 instances accept requests only from ELB?
A user has configured a website and launched it using the Apache web server on port 80. The user is using ELB with the EC2 instances for Load Balancing. What should the user do to ensure that the EC2 instances accept requests only from ELB?A . Configure the security group of EC2, which...
In which document would you expect to see an overview of actual service achievements against targets?
In which document would you expect to see an overview of actual service achievements against targets?A . Operational level agreement (OLA)B . Capacity planC . Service level agreement (SLA)D . SLA monitoring chart (SLAM)View AnswerAnswer: D
Which statement correctly describes the function of a private VLAN?
Which statement correctly describes the function of a private VLAN?A . A private VLAN partitions the Layer 2 broadcast domain of a VLAN into subdomainsB . A private VLAN partitions the Layer 3 broadcast domain of a VLAN into subdomainsC . A private VLAN enables the creation of multiple VLANs...
Which authentication method was used by the remote peer to prove its identity?
Refer to the exhibit. Which authentication method was used by the remote peer to prove its identity?A . Extensible Authentication ProtocolB . certificate authenticationC . pre-shared keyD . XAUTHView AnswerAnswer: C
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals. Your network contains a single Active Directory domain named contoso.com. The domain contains two computers named Computer1 and...