Which identification number is valid for an extended ACL?

Which identification number is valid for an extended ACL?A . 1B . 64C . 99D . 100E . 299F . 1099View AnswerAnswer: D

May 10, 2018 No Comments READ MORE +

You must assign each server to at least __ security group

You must assign each server to at least __ security groupA . 3B .  2C .  4D .  1View AnswerAnswer: A

May 10, 2018 No Comments READ MORE +

Which of the following are required to solve this?

It has become necessary to configure an existing serial interface to accept a second Frame Relay virtual circuit. Which of the following are required to solve this? (Choose three)A . configure static frame relay map entries for each subinterface network.B . remove the ip address from the physical interfaceC ....

May 10, 2018 No Comments READ MORE +

You have an IP Address Management (IPAM) server named IPAM1 that runs Windows Server 2016. IPAM1 manages 10 DHCP servers.

You have an IP Address Management (IPAM) server named IPAM1 that runs Windows Server 2016. IPAM1 manages 10 DHCP servers. You need to provide a user with the ability to track which clients receive which IP addresses from DHCP. The solution must minimize administrative privileges.A . IPAM MSM AdministratorsB ....

May 9, 2018 No Comments READ MORE +

Which option best describes RPL?

Which option best describes RPL?A . RPL stands for Routing over low priority links that use link-state LSAs to determine the best route between two root border routers.B . RPL stands for Routing over low priority links that use distance vector DOGAG to determine the best route between two root...

May 9, 2018 No Comments READ MORE +

What should you do?

Your company has an Office 365 Small Business subscription. You are the Microsoft SharePoint Online administrator. The company wants to have two separate public websites with different URLs. You need to configure the environment to support the public websites. What should you do?A . Upgrade to SharePoint Online for Office...

May 9, 2018 No Comments READ MORE +

Which of the following technical controls MUST be in place in order to promote the use of passphrases?

Company policy requires the use if passphrases instead if passwords. Which of the following technical controls MUST be in place in order to promote the use of passphrases?A . ReuseB . LengthC . HistoryD . ComplexityView AnswerAnswer: D

May 9, 2018 No Comments READ MORE +

The main method of Defense cache server DNS Request Flood is to use the DNS source authentication.

The main method of Defense cache server DNS Request Flood is to use the DNS source authentication.A . TRUEB . FALSEView AnswerAnswer: A

May 9, 2018 No Comments READ MORE +

Which of the following is the BEST response?

A security audit revealed that port 389 has been used instead of 636 when connecting to LDAP for the authentication of users. The remediation recommended by the audit was to switch the port to 636 wherever technically possible. Which of the following is the BEST response?A . Correct the audit....

May 9, 2018 No Comments READ MORE +

When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?

When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?A . snoopB . tcpdumpC . monitorD . tailView AnswerAnswer: B

May 9, 2018 No Comments READ MORE +