Which of the following is needed to protect BOTH the employee and the company?
An employee wishes to use a personal cell phone for work-related purposes, including storage of sensitive company data, during long business trips. Which of the following is needed to protect BOTH the employee and the company?A . An NDA ensuring work data stored on the personal phone remains confidentialB ....
What three configurations are supported when using these devices?
ESXi 6.5 introduces VMFS6, which supports both 512e and 512n devices. What three configurations are supported when using these devices? (Choose three.)A . Hosts with both 512e and 512n devices.B . Storage vMotion between both 512e and 512n devices.C . Datastore Extents spanned between both 512e and 512n devices.D ....
Which of the following is the BEST technology for the network administrator to implement?
When choosing a type of storage that integrates with the existing network infrastructure, the storage must be easily configurable to share files and can communicate with all existing clients over TCP/IP. Which of the following is the BEST technology for the network administrator to implement?A . iSCSIB . Fibre ChannelC...
What is the output of this code?
What is the output of this code? $world = 'world'; echo <<<'TEXT' hello $world TEXT;A . hello worldB . hello $worldC . PHP Parser errorView AnswerAnswer: C
What should you recommend?
You are evaluating an Azure application. The application includes the following elements: *A web role that provides the ASP.NET user interface and business logic *A single SQL database that contains all application data Each webpage must receive data from the business logic layer before returning results to the client. Traffic...
Which of the following description of the challenges for the cloud data center network is wrong?
Which of the following description of the challenges for the cloud data center network is wrong?A . Big data requires big pipesB . Business innovation requires network agilityC . Diversification requires an open networkD . Cloud data center requires the device to fully support forwarding control separationView AnswerAnswer: D
Which host mode must be active on the port?
After an endpoint has completed authentication with MAB, a security violation is triggered because a different MAC address was detected. Which host mode must be active on the port?A . single-host modeB . multidomain authentication host modeC . multiauthentication host modeD . multihost modeView AnswerAnswer: A
Which command output shows the interface assigned as the designated receiver of each VLAN?
Which command output shows the interface assigned as the designated receiver of each VLAN?A . show system vlan reservedB . show vlan internal bd-info bd-to-vlan all-bdC . show port internal info allD . show platform software enm internal info vlandb allView AnswerAnswer: D
Which Cisco product can help mitigate web-based attacks within a network?
Which Cisco product can help mitigate web-based attacks within a network?A . Adaptive Security ApplianceB . Web Security ApplianceC . Email Security ApplianceD . Identity Services EngineView AnswerAnswer: B
Which of the following authentication modes does VRRP use?
Which of the following authentication modes does VRRP use?A . No authenticationB . Simple text passwordC . MD5D . CHAPView AnswerAnswer: ABC