Security well known terms Choose 2
Security well known terms Choose 2A . TrojanB . PhishingC . Something LCD . RansomwareView AnswerAnswer: BD
Which command on a switchport can cause LLDP to accept LLDP packets but not send them?
Which command on a switchport can cause LLDP to accept LLDP packets but not send them?A . LLDP runB . LLDP advertiseC . LLDP receiveView AnswerAnswer: C
Which AWS Service would be very helpful in processing all this data?
You are in the process of building an online gaming site for a client and one of the requirements is that it must be able to process vast amounts of data easily. Which AWS Service would be very helpful in processing all this data?A . Amazon S3B . AWS Data PipelineC ....
Your team has a tomcat-based Java application you need to deploy into development, test and production environments. After some research, you opt to use Elastic Beanstalk due to its tight integration with your developer tools and RDS due to its ease of management. Your QA team lead points out that you need to roll a sanitized set of production data into your environment on a nightly basis. Similarly, other software teams in your org want access to that same restored data via their EC2 instances in your VPC .The optimal setup for persistence and security that meets the above requirements would be the following.
Your team has a tomcat-based Java application you need to deploy into development, test and production environments. After some research, you opt to use Elastic Beanstalk due to its tight integration with your developer tools and RDS due to its ease of management. Your QA team lead points out that you need to roll a sanitized...
Which login credentials are required when connecting to the console port in this output?
Refer to the exhibit. Which login credentials are required when connecting to the console port in this output?A . none requiredB . username cisco with password ciscoC . no username with password linepassD . login authentication defaultView AnswerAnswer: A Explanation: Here the console has been configured with the NO_AUTH name,...
In addition to coverage analysis results, what should be included in a post-deployment site survey report to ensure WLAN users experience acceptable performance?
In addition to coverage analysis results, what should be included in a post-deployment site survey report to ensure WLAN users experience acceptable performance?A . Layer 4 protocol availability analysis resultsB . Application Layer protocol availability analysis resultsC . Capacity analysis resultsD . WAN interface analysts resultsView AnswerAnswer: C
What are characteristics of Amazon 53? Choose 2 answers
What are characteristics of Amazon 53? Choose 2 answersA . 53 allows you to store objects of virtually unlimited size.B . 53 offers Provisioned lOPD . 53 allows you to store unlimited amounts of data.E . 53 should be used to host a relational database.F . Objects are directly accessible...
What should you recommend?
You create a stored procedure that retrieves all of the rows from a table named Table1. You need to recommend a solution to ensure that all of the statements in the stored procedure can be executed if another transaction is modifying rows in Table1 simultaneously. What should you recommend?A ....
Which four Windows PowerShell commands should you run in sequence?
DRAG DROP DRAG DROP A company uses Exchange Online. You need to create a shared mailbox and a group that has full access to the shared mailbox. Which four Windows PowerShell commands should you run in sequence? To answer, move the appropriate commands from the list of commands to the...
What possible issue does the given output indicate?
Refer to the exhibit. You issued the show crypto isakmp sa command to troubleshoot a connection failure on an IPsec VPN. What possible issue does the given output indicate?A . The pre-shared keys are mismatched.B . The peer is failing to respond.C . The transform sets are mismatched.D . The...