A data breach has occurred and your company database has been copied. Which security principle has been violated?

A data breach has occurred and your company database has been copied. Which security principle has been violated?A . confidentialityB . availabilityC . accessD . controlView AnswerAnswer: A

March 16, 2018 No Comments READ MORE +

On what group of devices can a network engineer summaries routes to remote WAN sites?

A network Engineer is designing a hierarchical design and needs to optimize WAN design. On what group of devices can a network engineer summaries routes to remote WAN sites?A . CoreB . DistributionC . Data Center Distribution WAN EdgeD . WAN EdgeE . Campus access distribution layerView AnswerAnswer: B Explanation:...

March 16, 2018 No Comments READ MORE +

Which of the following statements is incorrect in relation to Vault Operations in Amazon Glacier?

Your company has been storing a lot of data in Amazon Glacier and has asked for an inventory of what is in there exactly. So you have decided that you need to download a vault inventory. Which of the following statements is incorrect in relation to Vault Operations in Amazon Glacier?A ....

March 16, 2018 No Comments READ MORE +

Which two statements about the OSPF Router ID are true? (Choose two.)

Which two statements about the OSPF Router ID are true? (Choose two.) A. It identifies the source of a Type 1 LSA. B. It should be the same on all routers in an OSPF routing instance. C. By default, the lowest IP address on the router becomes the OSPF Router...

March 16, 2018 No Comments READ MORE +

Which user account should you use?

You administer a SQL Server 2016 database instance. You need to configure the SQL Server Database Engine service on a failover cluster. Which user account should you use?A . A domain userB . The BUILTINSYSTEM accountC . A local user with Run as Service permissionsD . The SQLBrowser accountView AnswerAnswer:...

March 16, 2018 No Comments READ MORE +

Which Cisco feature can help mitigate spoofing attacks by verifying symmetry of the traffic path?

Which Cisco feature can help mitigate spoofing attacks by verifying symmetry of the traffic path?A . Unidirectional Link DetectionB . Unicast Reverse Path ForwardingC . TrustSecD . IP Source GuardView AnswerAnswer: B

March 16, 2018 No Comments READ MORE +

You have been tasked with creating a wireless link between two buildings on a single campus. The link must support at least 150 Mbps data rates. What kind of WLAN technology role should you deploy?

You have been tasked with creating a wireless link between two buildings on a single campus. The link must support at least 150 Mbps data rates. What kind of WLAN technology role should you deploy?A . IBSSB . WPANC . Access BSSD . Wireless bridgingView AnswerAnswer: A

March 16, 2018 No Comments READ MORE +

What should you recommend?

You are designing a Windows Azure application that will use Windows Azure Table storage. You need to recommend an approach for minimizing storage costs. What should you recommend?A . Use Entity Group Transactions.B . Use multiple partitions to store data.C . Use a transaction scope to group all storage operations.D...

March 15, 2018 No Comments READ MORE +

Which two options can be used for vCenter Server 6.x database availability? (Choose two.)

Which two options can be used for vCenter Server 6.x database availability? (Choose two.)A . NSX load balancerB . Microsoft SQL Server 2012/2014 AlwaysOn Availability Groups (AG)C . vCenter Server WatchdogD . vCenter Server HeartbeatE . Microsoft Windows Server Failover ClusteringView AnswerAnswer: B,E

March 15, 2018 No Comments READ MORE +

Which two configurations are the minimum needed to enable EIGRP on the Cisco ASA appliance? (Choose two.)

Which two configurations are the minimum needed to enable EIGRP on the Cisco ASA appliance? (Choose two.)A . Enable the EIGRP routing process and specify the AS number.B . Define the EIGRP default-metric.C . Configure the EIGRP router IE . Use the neighbor command(s) to specify the EIGRP neighbors.F ....

March 15, 2018 1 Comment READ MORE +