How can you proect CDP from reconnaissance attacks?

How can you proect CDP from reconnaissance attacks?A . Enable dot1x on all ports that are connected to other switches.B . Disable CDP on ports connected to endpoints.C . Disbale CDP on trunk ports.D . Enable dynamic ARP inspection on all untrusted ports.View AnswerAnswer: B

April 23, 2018 No Comments READ MORE +

What types of HTTP authentication are supported by PHP? (Choose 2)

What types of HTTP authentication are supported by PHP? (Choose 2)A . BasicB . AdvancedC . StrictD . DigestE . RealmView AnswerAnswer: A, D

April 23, 2018 No Comments READ MORE +

Which three actions should you perform in sequence?

DRAG DROP You are an administrator for an Azure subscription that is used by your company. You have an Azure Web App that contains static content accessed by users. You plan to deliver content based on geographic location. The solution must allow clients to connect to a URL that ends...

April 23, 2018 No Comments READ MORE +

What represents the binary equivalence of 207?

What represents the binary equivalence of 207?A . 11001111B . 11101011C . 11010111D . 11010101View AnswerAnswer: A

April 23, 2018 No Comments READ MORE +

Which two actions should you perform?

You need to flag an item for direct delivery. Which two actions should you perform? Each correct answer presents part of the solution.A . Select a Direct delivery warehouse for the product.B . Enable the Direct delivery slider on the products.C . Select a default vendor for the product.D ....

April 23, 2018 No Comments READ MORE +

Which of the following VPN protocols establishes a secure session that can be initiated using a browser?

Which of the following VPN protocols establishes a secure session that can be initiated using a browser?A . IPSecB . SSL VPNC . PTPD . PPTPView AnswerAnswer: B

April 23, 2018 No Comments READ MORE +

Which two regulatory bodies should they check to find the maximum EIRP allowed?

A wireless engineer is designing the wireless networking for a company with offices in two different locations. Which two regulatory bodies should they check to find the maximum EIRP allowed? (Choose two.)A . IEEEB . FCCC . ITU-RD . ETSIE . Wi-Fi AllianceView AnswerAnswer: B, D

April 23, 2018 No Comments READ MORE +

Which layer in the TCP/IP model is responsible for delivering packets to their destination?

Which layer in the TCP/IP model is responsible for delivering packets to their destination?A . Application LayerB . Transport LayerC . Internet LayerD . Network Access LayerView AnswerAnswer: C

April 23, 2018 No Comments READ MORE +

Which of the following Operating System logs contains information about operational actions performed by OS components?

Operating System logs are most beneficial for Identifying or Investigating suspicious activities involving a particular host. Which of the following Operating System logs contains information about operational actions performed by OS components?A . Event logsB . Audit logsC . Firewall logsD . IDS logsView AnswerAnswer: A

April 23, 2018 No Comments READ MORE +

Which code segment should you use?

You need to update the routes to ensure that a product is always displayed on the product page. Which code segment should you use? A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: B

April 23, 2018 No Comments READ MORE +