Which of the following should be implemented?

A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?A . DLPB . AUPC . NDAD . SLAView AnswerAnswer: A

January 29, 2018 No Comments READ MORE +

Which command is used to enable 802.1x authorization on an interface?

Which command is used to enable 802.1x authorization on an interface?A . aaa authorization auth-proxy defaultB . authentication port-control autoC . authentication openD . authentication control-direction bothE . aaa authorization network default group tacacs+View AnswerAnswer: B

January 29, 2018 No Comments READ MORE +

Which two statements about ping flood attacks are true? (Choose two.)

Which two statements about ping flood attacks are true? (Choose two.)A . They use ICMP packets.B . The attack is intended to overwhelm the CPU of the target victim.C . They attack by sending ping requests to the return address of the network.D . They use SYN packets.E . They...

January 29, 2018 No Comments READ MORE +

Which two application protocols require application layer gateway support when using NAT on a Cisco router? (Choose two.)

Which two application protocols require application layer gateway support when using NAT on a Cisco router? (Choose two.)A . SIPB . HTTPC . FTPD . SMTPE . POP3View AnswerAnswer: A, C

January 29, 2018 No Comments READ MORE +

Which result of the configuration snippet is true?

Refer to the exhibit. Which result of the configuration snippet is true?A . A VACL map in applied to VLAN 100 and VLAN 200B . VACL acl01 is applied to VLAN 100 through 200C . Acl01 is applied to all of the VLANs on the switchD . Global statistics are...

January 29, 2018 No Comments READ MORE +

Which action should the administrator take to resolve the issue?

An administrator has multiple vCenter Server 6.5 systems but cannot enable Storage I/O Control (SIOC) on a datastore shared by ESXi hosts managed by the vCenter Server systems. Which action should the administrator take to resolve the issue?A . Unmount the datastore and then enable SIOC on the vCenter Server...

January 29, 2018 No Comments READ MORE +

Which two statements accurately describe a broadcast domain? (Choose two.)

Which two statements accurately describe a broadcast domain? (Choose two.)A . Broadcast domains require that the participating devices connect to common switches or hubs.B . Broadcast domains consist of devices reachable by frames addressed to the Layer 2 broadcast address.C . Broadcast domains require a gateway device such as a...

January 28, 2018 No Comments READ MORE +

What are two characteristics of a switch that is configured as a VTP client? (Choose two.)

What are two characteristics of a switch that is configured as a VTP client? (Choose two.)A . If a switch that is configured to operate in client mode cannot access a VTP server, then the switch reverts to transparent mode.B . On switches that are configured to operate in client...

January 28, 2018 No Comments READ MORE +

Why does it not allow him to specify the pre-shared secret?

An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server. While configuring the VPN community to specify the pre-shared secret the administrator found that the check box to enable...

January 28, 2018 No Comments READ MORE +