What is the difference between deterministic and probabilistic assessment method?
What is the difference between deterministic and probabilistic assessment method?A . At deterministic method we know the facts beforehand and at probabilistic method we make assumptionsB . At probabilistic method we know the facts beforehand and at deterministic method we make assumptionsC . Probabilistic method has an absolute natureD ....
What should you do?
You have two Hyper-V hosts named Server1 and Server2 that run Windows Server 2016. Server1 and Server2 are connected to the same network. On Server1 and Server2, you create an external network switch named Switch1. You have the virtual machines shown in the following table. All three virtual machines are...
Which three statements about HSRP operation are true? (Choose three.)
Which three statements about HSRP operation are true? (Choose three.) A. The virtual IP address and virtual MA+K44C address are active on the HSRP Master router. B. The HSRP default timers are a 3 second hello interval and a 10 second dead interval. C. HSRP supports only clear-text authentication. D....
Which line in the output indicates that the send queue is full and export packets are not being sent?
A network engineer executes the show ip flow export command. Which line in the output indicates that the send queue is full and export packets are not being sent?A . output dropsB . enqueuing for the RPC . fragmentation failuresD . adjacency issuesView AnswerAnswer: A Explanation: Table 5 show ip...
Which two elements are used to accomplish this?
A network engineer must adjust the STP interface attributes to influence root port selection. Which two elements are used to accomplish this? (Choose two.)A . port-priorityB . costC . forward-timersD . link typeE . root guardView AnswerAnswer: AB Explanation: Spanning tree forces redundant data paths into a standby (blocked) state....
What two sensor types exist in an IDS/IPS solution? (Choose two)
What two sensor types exist in an IDS/IPS solution? (Choose two)A . hostB . anomaly basedC . policy basedD . network basedE . signatureView AnswerAnswer: BC Explanation: Incorrect answers have been selected for the same in Hesseny2000 pdf. This leaves us with 3x answers which all seems to be correct...
What are two advantages of employing scalability when designing a campus network? (Choose two.)
What are two advantages of employing scalability when designing a campus network? (Choose two.)A . reduces operational costB . higher port densityC . investment protectionD . consistent operationE . improved fault toleranceView AnswerAnswer: D,E
Which two options are advantages that should be included in the?
A network designer needs to explain the advantages of route summarization to a client. Which two options are advantages that should be included in the? (Choose two)A . Increases security by advertising fake networksB . Reduces routing table sizeC . Advertises detailed routing tablesD . Utilizes the routers full CPU...
What is the purpose of the autonomous-system {autonomous-system-number} command?
What is the purpose of the autonomous-system {autonomous-system-number} command?A . It sets the EIGRP autonomous system number in a VRC . It sets the BGP autonomous system number in a VRE . It sets the global EIGRP autonomous system number.F . It sets the global BGP autonomous system number.View AnswerAnswer:...
Which two conditions must be true?
You create a business rule for the Account entity. The business rule must nin when you import account records. Which two conditions must be true? Each correct answer presents a complete solution.A . The scope was set to Entity.B . The scope was set to Account.C . A business rule...