Which of the following vulnerabilities is MOST critical and should be prioritized for exploitation?

A penetration tester reviews the scan results of a web application. Which of the following vulnerabilities is MOST critical and should be prioritized for exploitation?A . Stored XSSB . Full path disclosureC . Expired certificateD . Clickjacking View AnswerAnswer: A

March 13, 2018 No Comments READ MORE +

Which command should be entered to check for network connectivity?

You have been informed from the field that a new Cisco TelePresence video endpoint has been deployed with an IPv4 address of 172.28.254.45. You need to check for connectivity from the Cisco Unified Communications Manager server. Which command should be entered to check for network connectivity?A . utils network traceroute...

March 13, 2018 No Comments READ MORE +

What is the maximum number of virtual MAC addresses that GLBP allows per group?

What is the maximum number of virtual MAC addresses that GLBP allows per group?A . 2B . 4C . 6D . 8View AnswerAnswer: B Explanation: GLBP Virtual MAC Address Assignment A GLBP group allows up to four virtual MAC addresses per group. The AVG is responsible for assigning the virtual...

March 13, 2018 No Comments READ MORE +

Which two issues does utilizing an IP network storage solution for IP video surveillance help overcome? (Choose two.)

Which two issues does utilizing an IP network storage solution for IP video surveillance help overcome? (Choose two.)A . analog to IP conversionB . large, expandable storage spaceC . physical securityD . scalabilityE . faster bit rate for storageView AnswerAnswer: B, D

March 13, 2018 No Comments READ MORE +

Which technology should you use?

You need to support web and mobile application secure logons. Which technology should you use?A . Azure Active Directory B2BB . OAuth 1.0C . LDAPD . Azure Active Directory B2CView AnswerAnswer: D

March 13, 2018 No Comments READ MORE +

Which change will correct the issue?

A network engineer is connected via wireless to a Cisco AireOS WLC and wants to download the configuration but is unable to do so. Which change will correct the issue?A . enable management via wirelessB . connect via wired networkC . enable TelnetD . enable WebAuth SecureWebE . connect on...

March 13, 2018 No Comments READ MORE +

You have a computer named Computer1 that runs Windows 10

HOTSPOT You have a computer named Computer1 that runs Windows 10. You run the Get-VMHost | fl* cmdlet on Computer1, and you receive the following output: Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the output. View AnswerAnswer: Explanation:...

March 13, 2018 No Comments READ MORE +

True or False: In Amazon Route 53, you can create a hosted zone for a top-level domain (TLD).

True or False: In Amazon Route 53, you can create a hosted zone for a top-level domain (TLD).A .  FALSEB .  False, Amazon Route 53 automatically creates it for you.C .  True, only if you send an XML document with a CreateHostedZoneRequest element for TLE .  TRUEView AnswerAnswer: A Explanation:...

March 12, 2018 No Comments READ MORE +

Which of the following devices should be installed on a network to monitor the presence of and actively defend against attacks?

Which of the following devices should be installed on a network to monitor the presence of and actively defend against attacks?A . An IPSB . A protocol analyzerC . A traffic shaperD . An IDSView AnswerAnswer: A

March 12, 2018 No Comments READ MORE +

When a user attempts to connect to an HTTPS site, what is the expected result with this configuration?

View the exhibit. When a user attempts to connect to an HTTPS site, what is the expected result with this configuration?A . The user is required to authenticate before accessing sites with untrusted SSL certificates.B . The user is presented with certificate warnings when connecting to sites that have untrusted...

March 12, 2018 No Comments READ MORE +