What is the purpose of unicast reverse path forwarding?

What is the purpose of unicast reverse path forwarding?A . to validate packet receipt on interfaces where the traffic should be receivedB . to forward packets out the interfaces where the traffic should be receivedC . to forward packets out the interfaces where the traffic should be sentD . to...

February 2, 2018 No Comments READ MORE +

Which three actions should you perform?

You plan to use the Connected Field Service solution to proactively manage field equipment. You need to prepare for the installation. Which three actions should you perform? Each correct answer presents part of the solution.A . Install Microsoft SharePoint Online.B . Purchase a Microsoft Azure subscription.C . Implement Microsoft Power...

February 2, 2018 No Comments READ MORE +

What should you use?

You need to examine information about logins, CPU times, and Disk I/O on a particular database in Microsoft Azure. What should you use?A . Activity MonitorB . Sp_who3C . SQL Server Management Studio (SSMS) Object ExplorerD . SQL Server Data CollectorE . SQL Server Data Tools (SSDT)F . SQL Server...

February 2, 2018 No Comments READ MORE +

When IP Source Guard with source IP filtering is enabled on an interface, which feature must be enabled on the access VLAN for that interface?

When IP Source Guard with source IP filtering is enabled on an interface, which feature must be enabled on the access VLAN for that interface?A . DHCP snoopingB . storm controlC . spanning-tree portfastD . private VLANView AnswerAnswer: A Explanation: IP Source Guard Configuration Guidelines You can configure static IP...

February 1, 2018 No Comments READ MORE +

Which two operating modes does VPLS support, (choose two).

Which two operating modes does VPLS support, (choose two).A . dynamic modeB . transport modeC . strict modeD . port modeE . VLAN modeF . loose modeView AnswerAnswer: D E

February 1, 2018 No Comments READ MORE +

Which statement about data leak prevention (DLP) on a FortiGate is true?

Which statement about data leak prevention (DLP) on a FortiGate is true?A . Traffic shaping can be applied to DLP sensors.B . It can be applied to a firewall policy in a flow-based VDOD . Files can be sent to FortiSandbox for detecting DLP threats.E . It can archive files...

February 1, 2018 No Comments READ MORE +

Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel?

Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel?A . Routing loopB . MTU black holeC . Framing errorsD . SYN floodView AnswerAnswer: B

February 1, 2018 No Comments READ MORE +

Which of the following methods would BEST assess the security of the product?

A deployment manager is working with a software development group to assess the security of a new version of the organization’s internally developed ERP tool. The organization prefers to not perform assessment activities following deployment, instead focusing on assessing security throughout the life cycle. Which of the following methods would...

February 1, 2018 No Comments READ MORE +

What is the default number of dynamic VNICs that is specified by the Cisco UCS Manager when creating a dynamic vNIC connection policy?

What is the default number of dynamic VNICs that is specified by the Cisco UCS Manager when creating a dynamic vNIC connection policy?A . 256B . 54C . 128D . 257View AnswerAnswer: B

February 1, 2018 No Comments READ MORE +