An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the firewall be configured?
An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the firewall be configured?A . Allow TCP port 3389 outboundB . Allow UDP port 3389 inboundC . Allow UDP port 3389 outboundD...
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...
For each setting, which value should you use?
HOTSPOT You plan to migrate a Microsoft SQL Server workload from an on-premises server to a Microsoft Azure virtual machine (VM). The current server contains 4 cores with an average CPU workload of 6 percent and a peak workload of 10 percent when using 2.4Ghz processors. You gather the following...
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.
Sticky Decision Function (SDF) is required to prevent which of the following? Assume you set up an Active-Active cluster.A . Symmetric routingB . FailoversC . Asymmetric routingD . Anti-SpoofingView AnswerAnswer: C
Which three actions should you perform in sequence?
DRAG DROP You administer a Microsoft SQL Server 2012 database. Your database is experiencing deadlock issues. You need to be able to monitor deadlocks. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them...
Which of the following components is responsible for converting light into digital information?
Which of the following components is responsible for converting light into digital information?A . MicrophoneB . DigitizerC . InverterD . WebcamView AnswerAnswer: D
What does the frame-relay interface-dlci command configure?
What does the frame-relay interface-dlci command configure?A . local DLCI on the subinterfaceB . remote DLCI on the main interfaceC . remote DCLI on the subinterfaceD . local DLCI on the main interfaceView AnswerAnswer: A Explanation: Frame Relay for ICND Exam http://www.ciscopress.com/articles/article.asp?p=100603&seqNum=3 To assign a data-link connection identifier (DLCI) to...
What can the engineer do to prevent this service-affecting re-convergence only in the case of momentary link bounces until the link can be repaired?
Users are complaining of intermittent high packet loss for seconds at a time. The engineer troubleshooting the issue finds that a link is bouncing for millisecond at a time, causing the traffic path to re-converge onto a congested FastEthernet link. What can the engineer do to prevent this service-affecting re-convergence...
Which VPN connectivity representing both Hub-and-Spokes and Spokes-to- Spokes?
Which VPN connectivity representing both Hub-and-Spokes and Spokes-to- Spokes?A . DMVPNB . IPSec VPNC . VPN RouterD . VPN HubView AnswerAnswer: A
Where should you report suspected security vulnerability in Cisco router software?
Where should you report suspected security vulnerability in Cisco router software?A . Cisco TACB . Cisco IOS EngineeringC . Cisco PSIRTD . Cisco SIOView AnswerAnswer: C