Which of the following vulnerabilities is MOST critical and should be prioritized for exploitation?
A penetration tester reviews the scan results of a web application. Which of the following vulnerabilities is MOST critical and should be prioritized for exploitation?A . Stored XSSB . Full path disclosureC . Expired certificateD . Clickjacking View AnswerAnswer: A
Which command should be entered to check for network connectivity?
You have been informed from the field that a new Cisco TelePresence video endpoint has been deployed with an IPv4 address of 172.28.254.45. You need to check for connectivity from the Cisco Unified Communications Manager server. Which command should be entered to check for network connectivity?A . utils network traceroute...
What is the maximum number of virtual MAC addresses that GLBP allows per group?
What is the maximum number of virtual MAC addresses that GLBP allows per group?A . 2B . 4C . 6D . 8View AnswerAnswer: B Explanation: GLBP Virtual MAC Address Assignment A GLBP group allows up to four virtual MAC addresses per group. The AVG is responsible for assigning the virtual...
Which two issues does utilizing an IP network storage solution for IP video surveillance help overcome? (Choose two.)
Which two issues does utilizing an IP network storage solution for IP video surveillance help overcome? (Choose two.)A . analog to IP conversionB . large, expandable storage spaceC . physical securityD . scalabilityE . faster bit rate for storageView AnswerAnswer: B, D
Which technology should you use?
You need to support web and mobile application secure logons. Which technology should you use?A . Azure Active Directory B2BB . OAuth 1.0C . LDAPD . Azure Active Directory B2CView AnswerAnswer: D
Which change will correct the issue?
A network engineer is connected via wireless to a Cisco AireOS WLC and wants to download the configuration but is unable to do so. Which change will correct the issue?A . enable management via wirelessB . connect via wired networkC . enable TelnetD . enable WebAuth SecureWebE . connect on...
You have a computer named Computer1 that runs Windows 10
HOTSPOT You have a computer named Computer1 that runs Windows 10. You run the Get-VMHost | fl* cmdlet on Computer1, and you receive the following output: Use the drop-down menus to select the answer choice that completes each statement based on the information presented in the output. View AnswerAnswer: Explanation:...
True or False: In Amazon Route 53, you can create a hosted zone for a top-level domain (TLD).
True or False: In Amazon Route 53, you can create a hosted zone for a top-level domain (TLD).A . FALSEB . False, Amazon Route 53 automatically creates it for you.C . True, only if you send an XML document with a CreateHostedZoneRequest element for TLE . TRUEView AnswerAnswer: A Explanation:...
Which of the following devices should be installed on a network to monitor the presence of and actively defend against attacks?
Which of the following devices should be installed on a network to monitor the presence of and actively defend against attacks?A . An IPSB . A protocol analyzerC . A traffic shaperD . An IDSView AnswerAnswer: A
When a user attempts to connect to an HTTPS site, what is the expected result with this configuration?
View the exhibit. When a user attempts to connect to an HTTPS site, what is the expected result with this configuration?A . The user is required to authenticate before accessing sites with untrusted SSL certificates.B . The user is presented with certificate warnings when connecting to sites that have untrusted...