Which of the following is not true about listening ports?

Which of the following is not true about listening ports?A . A listening port is a port held open by a running application in order to accept inbound connections.B . Seeing traffic from a known port will identify the associated service.C . Listening ports use values that can range between...

July 29, 2018 No Comments READ MORE +

A cloud computing vendor is focusing on delivering applications to customers. The goal is to simplify the deployment of database functionality while removing the need for customers to manage the operation system and application patching. Which of the following types of solution is the vendor offering?

A cloud computing vendor is focusing on delivering applications to customers. The goal is to simplify the deployment of database functionality while removing the need for customers to manage the operation system and application patching. Which of the following types of solution is the vendor offering?A . IT as a...

July 29, 2018 No Comments READ MORE +

An exhibit of HSRP with problem with secondary (error is duplicate IP address on 1 of switch port that duplicate with virtual IP address).

An exhibit of HSRP with problem with secondary (error is duplicate IP address on 1 of switch port that duplicate with virtual IP address).A . misconfigureB . PC's IP addressC . STP loopView AnswerAnswer: C

July 29, 2018 No Comments READ MORE +

Which hybrid cloud strategy should be recommended to the company?

A start-up company with a limited budget is planning to adopt a hybrid cloud solution for their operations. The company has business-critical applications that serve customers and have strict service levels. In addition, the company has less critical applications such as backup and archive. Which hybrid cloud strategy should be...

July 29, 2018 No Comments READ MORE +

As part of a wireless site survey in a hospital, an engineer needs to identify potential Layer 1 interferers. In which three areas is the engineer most likely expect to find sources of 2.4 GHz and 5 GHz RF noise? (Choose three.)

As part of a wireless site survey in a hospital, an engineer needs to identify potential Layer 1 interferers. In which three areas is the engineer most likely expect to find sources of 2.4 GHz and 5 GHz RF noise? (Choose three.)A . emergency roomB . magnetic resonance imagingC ....

July 29, 2018 No Comments READ MORE +

What is the primary difference between 6PE and 6VPE?

What is the primary difference between 6PE and 6VPE?A . 6VPE does not require an MPLS core.B . 6VPE requires an IPv6-aware core.C . 6VPE provides IPv6 VPN services.D . 6VPE tunnels IPv6 packets inside IPv4 packets.View AnswerAnswer: C

July 29, 2018 No Comments READ MORE +

When considering the three VoIP design models - single site, centralized multisite, and distributed multisite - which question below would help to eliminate one of the options?

When considering the three VoIP design models - single site, centralized multisite, and distributed multisite - which question below would help to eliminate one of the options?A . Will the switches be required to provide inline power?B . Will users need to make offsite calls, beyond the enterprise?C . Will...

July 29, 2018 No Comments READ MORE +

What should you modify?

You have a Hyper-V host named Hyper1 that has Windows Server 2012 installed. Hyper1 hosts 20 virtual machines. Hyper1 has one physical network adapter. You need to implement a networking solution that evenly distributes the available bandwidth on Hyper1 to all of the virtual machines. What should you modify?A ....

July 29, 2018 No Comments READ MORE +

which term best describes the concept of preventing the modification of data in transit and in storage?

which term best describes the concept of preventing the modification of data in transit and in storage?A . ConfidentialityB . IntegrityC . AvailabilityD . fidelityView AnswerAnswer: B Explanation: Integrity for data means that changes made to data are done only by authorized individuals/systems. Corruption of data is a failure to...

July 29, 2018 No Comments READ MORE +

Which type of attack is directed against the network directly:

Which type of attack is directed against the network directly:A . Denial of ServiceB . phishingC . trojan horseView AnswerAnswer: A

July 29, 2018 No Comments READ MORE +