Which of the following statements about access lists are true? (Choose three.)

Which of the following statements about access lists are true? (Choose three.)A . Extended access lists should be placed as near as possible to the destinationB . Extended access lists should be placed as near as possible to the sourceC . Standard access lists should be placed as near as...

April 4, 2018 No Comments READ MORE +

If router R1 is running two OSPF processes, A and B, how can you configure 1 to prefer the A internal routes over the B internal routes?

If router R1 is running two OSPF processes, A and B, how can you configure 1 to prefer the A internal routes over the B internal routes?A . Configure the preferred OSPF process with a lower router IDB . Change the administrative distance of one of the OSPF processC ....

April 4, 2018 No Comments READ MORE +

Which of the following options would you consider?

You are designing a data leak prevention solution for your VPC environment. You want your VPC Instances to be able to access software depots and distributions on the Internet for product updates. The depots and distributions are accessible via third party CONs by their URLs. You want to explicitly deny any other outbound connections...

April 3, 2018 No Comments READ MORE +

What should you recommend?

A customer has the following requirements: • Provision hundreds of on premises virtual machines on an as-needed basis. • License Windows Server on virtual machines hosted in Microsoft Azure. You need to recommend the most cost effective Windows Server licensing option. What should you recommend?A . Windows Server StandardB ....

April 3, 2018 No Comments READ MORE +

Which entity assigns IPv6 addresses to end users?

Which entity assigns IPv6 addresses to end users?A . ICANNB . APNICC . RIRD . ISPsView AnswerAnswer: D

April 3, 2018 No Comments READ MORE +

What is the benefit of VLSM?

What is the benefit of VLSM?A . reduces configuration complexity by using the same subnet mask lengthB . reduces the routing table size by using automatic route summarizationC . reduces the routing table size by using manual route summarizationD . allows the subnet mask and classful routing updates to be...

April 3, 2018 No Comments READ MORE +

How do you define forensic computing?

How do you define forensic computing?A . It is the science of capturing, processing, and investigating data security incidents and making it acceptable to a court of law.B . It is a methodology of guidelines that deals with the process of cyber investigationC . It Is a preliminary and mandatory...

April 3, 2018 No Comments READ MORE +

Which two rights are included in a Microsoft Office 365 Proplus User Subscription License (USL)? Each correct answer presents a complete solution.

Which two rights are included in a Microsoft Office 365 Proplus User Subscription License (USL)? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.A . rights to activate Office 365 ProPlus on an unlimited number of machinesB . rights to install Office Professional Plus...

April 3, 2018 No Comments READ MORE +

About the static and dynamic routing, which of the following statement is not correct?

About the static and dynamic routing, which of the following statement is not correct?A . Static routing configuration in the enterprise application is simple, easy managementB . After administrator deploying dynamic routing protocols in enterprise networks, the late maintenance and extension can be more convenient.C . After the link failure,...

April 3, 2018 No Comments READ MORE +

Which statement about Cisco Security Manager form factors is true?

Which statement about Cisco Security Manager form factors is true?A . Cisco Security Manager Professional and Cisco Security Manager UCS Server Bundles support FWSMs.B . Cisco Security Manager Standard and Cisco Security Manager Professional support FWSMs.C . Only Cisco Security Manager Professional supports FWSMs.D . Only Cisco Security Manager Standard...

April 3, 2018 No Comments READ MORE +