Which two options are design requirements for leaf nodes in a Cisco Clos design? (Choose two.)
Which two options are design requirements for leaf nodes in a Cisco Clos design? (Choose two.)A . high 40-Gb/s port densityB . spine interconnectivityC . leaf interconnectivityD . fabric policy enforcementView AnswerAnswer: B, D
In biometrics, "one-to-many" search against database of stored biometric images is done in:
In biometrics, "one-to-many" search against database of stored biometric images is done in:A . AuthenticationB . IdentificationC . IdentitiesD . Identity-based access controlView AnswerAnswer: B Explanation: In biometrics, identification is a "one-to-many" search of an individual's characteristics from a database of stored images. Source: KRUTZ, Ronald L. & VINES, Russel...
Which of the following should be the most important factor driving a single application availability requirement when developing a disaster recovery plan?
Which of the following should be the most important factor driving a single application availability requirement when developing a disaster recovery plan?A . Confidentiality of data processed by the applicationB . The criticality of the business processes supported by the applicationC . Total cost of ownership (TCO) of the...
What are possible reasons for this problem?
Refer to the graphic. R1 is unable to establish an OSPF neighbor relationship with R3. What are possible reasons for this problem? (Choose two)A . All of the routers need to be configured for backbone Area 1B . R1 and R2 are the DR and BDR, so OSPF will not...
Which garbage collector method should you use?
You are developing an application by using C#. The application includes an object that performs a long running process. You need to ensure that the garbage collector does not release the object's resources until the process completes. Which garbage collector method should you use?A . ReRegisterForFinalize()B . SuppressFinalize()C . Collect()D...
After determining the alert was a true positive, which of the following represents the MOST likely cause?
A cybersecurity analyst has received an alert that well-known “call home” messages are continuously observed by network sensors at the network boundary. The proxy firewall successfully drops the messages. After determining the alert was a true positive, which of the following represents the MOST likely cause?A . Attackers are running...
Which could be two reasons for this?
An administrator is attempting to enable Fault Tolerance on a virtual machine but the operation does not complete successfully. Which could be two reasons for this? (Choose two.)A . The virtual machine has more than 1 vCPC . The virtual machine has uncommitted snapshots.D . vSphere HA is disabled for...
When SDM templates are configured, which action must be performed for the configuration to take effect?
When SDM templates are configured, which action must be performed for the configuration to take effect?A . reloadB . shutdownC . write memoryD . backup configView AnswerAnswer: A
What type of attack was the Stuxnet virus?
What type of attack was the Stuxnet virus?A . cyber warfareB . hacktivismC . botnetD . social engineeringView AnswerAnswer: A
Where should the administrator add the four-month retention period under Host Properties?
Weekly full backups run for clientA on master1 using a storage unit that belongs to media1. The administrator is required to retain clientA's full backups for a period of four months. When the administrator modifies the Full schedule, four months is missing from the selection list. Where should the administrator...