A security administrator is trying to encrypt communication. For which of the following reasons should administrator take advantage of the Subject Alternative Name (SAM) attribute of a certificate?

A security administrator is trying to encrypt communication. For which of the following reasons should administrator take advantage of the Subject Alternative Name (SAM) attribute of a certificate?A . It can protect multiple domainsB . It provides extended site validationC . It does not require a trusted certificate authorityD ....

March 2, 2018 No Comments READ MORE +

Which application could you recommend for these users?

A customer wants all employees to be able to communicate seamlessly with each other and external parties. Some of their employees are often on the road, or off-site. Which application could you recommend for these users?A . Mobile TwinningB . Avaya CommunicatorC . Suggest the User divert their extension to...

March 2, 2018 No Comments READ MORE +

Where would you look to find the minimum and the maximum number of array LUNS supported by FlexArray?

Where would you look to find the minimum and the maximum number of array LUNS supported by FlexArray?A . Interoperability Matrix Tool (IMT)B . One CollectC . Hardware UniverseD . Config AdvisorView AnswerAnswer: C

March 2, 2018 No Comments READ MORE +

What are two primary purposes of Layer 2 detection in Cisco IPS networks? (Choose two.)

What are two primary purposes of Layer 2 detection in Cisco IPS networks? (Choose two.)A . identifying Layer 2 ARP attacksB . detecting spoofed MAC addresses and tracking 802.1X actions and data communication after a successfulclient associationC . detecting and preventing MAC address spoofing in switched environmentsD . mitigating man-in-the-middle...

March 2, 2018 No Comments READ MORE +

What are the two methods of ensuring that the RPF check passes? (Choose two)

What are the two methods of ensuring that the RPF check passes? (Choose two)A . implementing static mroutesB . implementing OSPF routing protocolC . implementing MBGPD . disabling the interface of the router back to the multicast sourceE . disabling BGP routing protocolView AnswerAnswer: AC Explanation: The router determines the...

March 2, 2018 No Comments READ MORE +

What new feature was introduced to the Content Library in vSphere 6.5?

What new feature was introduced to the Content Library in vSphere 6.5?A . Mount an ISO directly from the Content Library.B . Deploy a virtual machine from an OVF Package in a Content Library.C . Upload a File from a URL to a Library Item.D . Upload a File from...

March 2, 2018 No Comments READ MORE +

For Cisco TelePresence endpoints with TC7.0 software, configuration backup and restore appears where?

Refer to the exhibit. For Cisco TelePresence endpoints with TC7.0 software, configuration backup and restore appears where?A . Call Control tabB . Configuration tabC . Diagnostics tabD . Maintenance tabE . Home tabView AnswerAnswer: D

March 2, 2018 No Comments READ MORE +

To allow a user access to the SSA tool for system monitoring and troubleshooting, which rights group in the security setting must the user have enabled?

To allow a user access to the SSA tool for system monitoring and troubleshooting, which rights group in the security setting must the user have enabled?A . Admin SystemB . Maint AdminC . Installation groupD . Administration groupView AnswerAnswer: D

March 2, 2018 No Comments READ MORE +

The site in this AirMagnet Survey heat map is ready for which level of service?

Refer to the exhibit. The site in this AirMagnet Survey heat map is ready for which level of service?A . dataB . voiceC . locationD . RFIDView AnswerAnswer: A

March 2, 2018 No Comments READ MORE +

According to TOGAF, in which sequence should Application Architecture and Data Architecture be developed in Phase C?

According to TOGAF, in which sequence should Application Architecture and Data Architecture be developed in Phase C?A . Application Architecture should be developed first, then Data ArchitectureB . Application Architecture should be developed concurrently with Data ArchitectureC . Data Architecture should be developed first, then Application ArchitectureD . Application Architecture...

March 2, 2018 No Comments READ MORE +