An intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources. Which evasion technique does this attempt indicate?
An intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources. Which evasion technique does this attempt indicate?A . traffic fragmentationB . resource exhaustionC . timing attackD . tunnelingView AnswerAnswer: B
After an Amazon VPC instance is launched, can I change the VPC security groups it belongs to?
After an Amazon VPC instance is launched, can I change the VPC security groups it belongs to?A . No. You cannot.B . Yes. You can.C . Only if you are the root userD . Only if the tag "VPC_Change_Group" is trueView AnswerAnswer: C
Which three actions should you perform on DC10?
DRAG DROP Your network contains an Active Directory forest named contoso.com. Recently, all of the domain controllers that ran Windows Server 2003 were replaced by domain controllers that run Windows Server 2012 R2. From Event Viewer, you discover SYSVOL journal wrap errors on a domain controller named dc10.contoso.com. You need...
Which two describe how media resources and audio streams operate with Cisco Unified Communications Manager? (Choose two.)
Which two describe how media resources and audio streams operate with Cisco Unified Communications Manager? (Choose two.)A . Audio streams are terminated differently depending on the signaling protocol, such as SCCP or SIC . Audio streams are always terminated by media resources.D . All media resources register with Cisco Unified...
Which actions can User1 perform?
HOTSPOT Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3, and Server4 that run Windows Server 2016. Server1 has IP Address Management (IPAM) installed. Server2, Server3, and Server 4 have the DHCP Server role installed. IPAM manages Server2, Server3, and Server4....
What should you do?
You create a new virtual disk in a storage pool by using the New Virtual Disk Wizard. You discover that the new virtual disk has a write-back cache of 1 GB. You need to ensure that the virtual disk has a write-back cache of 5 GB. What should you do?A...
Which two ports are used for SIP communications between an endpoint and the SIP server? (Choose two.)
Which two ports are used for SIP communications between an endpoint and the SIP server? (Choose two.)A . 1719 (TCP)B . 5061 (TLS)C . 1721 (TLS)D . 5060 (TCP)E . 1720 (TCP)View AnswerAnswer: BD
Looking at the configuration of the switch, what could be the possible issue?
Refer to the exhibit. aaa authentication login default group radius aaa authentication login NO_AUTH none aaa authentication login vty local aaa authentication dot1x default group radius aaa authorization network default group radius aaa accounting update newinfo aaa accounting dot1x default start-stop group radius aaa server radius dynamic-author host 161.1.7.14 server...
Which three actions should you perform in sequence?
DRAG DROP You administer three Microsoft SQL Server 2012 servers named ServerA, ServerB, and ServerC. ServerA is the acting principal and ServerB is the mirror. You need to add ServerC as a witness to the existing mirroring session between ServerA and ServerB. You need to achieve this goal without delaying...
What are the correct steps to migrate the storage of a virtual machine?
What are the correct steps to migrate the storage of a virtual machine?A . Right-click the virtual machine and select Migrate Select change storage only Select the format for the virtual machine's disks Select the datastore to migrate to Select the destination network for all VM network adapters Click FinishB...