Which of the following is not a component of a Operations Security "triples"?

Which of the following is not a component of a Operations Security "triples"?A .  AssetB .  ThreatC .  VulnerabilityD .  RiskView AnswerAnswer: D Explanation: The Operations Security domain is concerned with triples - threats, vulnerabilities and assets. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering...

August 29, 2018 No Comments READ MORE +

Which should you monitor to determine the cause?

You notice frequent writes to the page file. Which should you monitor to determine the cause?A . CPUB . RAMC . NetworkD . Hard diskView AnswerAnswer: B Explanation: When the RAM is full the page file is used as virtual RAM.

August 29, 2018 No Comments READ MORE +

What configuration change can you make to cause IS-IS to select the optimal path based on the interface bandwidth?

You have just enabled IS-IS on the lab testing network. You notice that IS-IS is not using the optimal path selection based on the interface bandwidth. Currently, the IS-IS routing process seems to be selecting the best path based on the hop count. What configuration change can you make to...

August 29, 2018 No Comments READ MORE +

About firewalls and IDS, which of the following is true?

About firewalls and IDS, which of the following is true?A . Firewall is a bypass device for fine-grained detectionB . IDS is a straight-path device and can't perform depth detectionC . Firewall is unable to detect insider malicious operation or misoperationD . IDS can't interact with the firewallView AnswerAnswer: C

August 29, 2018 No Comments READ MORE +

Which Windows feature should you use?

You need to find out whether your computer can run a program that performs resource-intensive tasks. Which Windows feature should you use?A . System Configuration UtilityB . Memory Diagnostics ToolC . Reliability and Performance MonitorD . Windows Experience IndexView AnswerAnswer: D

August 29, 2018 No Comments READ MORE +

Based on the exhibit, which virtual machine(s) can be successfully powered on?

Refer to the Exhibit. An administrator has created the resource pool configuration shown in the Exhibit. Based on the exhibit, which virtual machine(s) can be successfully powered on?A . VM-M1 onlyB . VM-K1 onlyC . VM-K1 and VM-K2 onlyD . VM-K1, VM-K2, and VM-M1View AnswerAnswer: D

August 29, 2018 No Comments READ MORE +

What should you do first?

Your network contains 20 iSCSI storage appliances that will provide storage for 50 Hyper-V hosts running Windows Server 2012 R2. You need to configure the storage for the Hyper-V hosts. The solution must minimize administrative effort. What should you do first?A . Install the iSCSI Target Server role service and...

August 29, 2018 No Comments READ MORE +

Which Centera feature is supported in an ECS 3.0 CAS environment?

Which Centera feature is supported in an ECS 3.0 CAS environment?A . Shredding (DOD 5015.2)B . Advance RetentionC . Erasure CodingD . Single Instance StorageView AnswerAnswer: B

August 29, 2018 No Comments READ MORE +

How should you complete the Transact-SQL statement?

DRAG DROP You have a database that tracks orders and deliveries for customers in North America. System versioning is enabled for all tables. The database contains the Sales.Customers, Application. Cities, and Sales. CustomerCategories tables. Details for the Sales.Customers table are shown in the following table: Details for the Application.Cities table...

August 29, 2018 No Comments READ MORE +

Which feature does the embedded eDPM server support on a VMAX3?

Which feature does the embedded eDPM server support on a VMAX3?A . eNASB . FASC . XD . D@REE . ESRSView AnswerAnswer: C Explanation: Reference: https://www.emc.com/collateral/white-papers/h13936-emc-vmax3-data-rest-encryption-wp.pdf (5)

August 29, 2018 No Comments READ MORE +