- All Exams Instant Download
What should the teller do after completing the transaction?
A customer comes into the bank and appears to be ill-at-ease waiting in the teller line. When the customer gets to the teller, he become exceedingly nervous and asks for a large cashier’s check to be cashed and disbursed to him in $100 bills. What should the teller do after...
Within Cisco Firepower Management Center, where does a user add or modify widgets?
Within Cisco Firepower Management Center, where does a user add or modify widgets?A . dashboard B. reporting C. context explorer D. summary toolView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Using_Dashboards.html
Which of the following commands will help determine and isolate issues on the network side?
A systems administrator observes high latency values when reaching a remote web server. Which of the following commands will help determine and isolate issues on the network side?A . mtr B. dig C. netstat D. routeView AnswerAnswer: A Explanation: Reference: https://www.keycdn.com/support/what-is-latency
What are two red flags that could indicate money laundering or financing terrorism?
A corporate services provider in a European Union (EU) country has a prospect from an African country who deals in oil and gas. The prospect intends to develop an oil terminal in his home country with a $75 million dollar loan secured by a third party, which is a trust...
What is the most recommended and secureOAuth scope setting that an Architect should recommend?
Universal Containers (UC) is planning to deploy a custom mobile app that will allow usersto get e-signatures from its customers on their mobile devices. The mobile app connects to Salesforce to upload the e-signature as a file attachment and uses OAuth protocol for both authentication and authorization . What is...
According to IIA guidance, which of the following statements is true regarding due professional care?
According to IIA guidance, which of the following statements is true regarding due professional care?A . Internal auditors must exercise due professional care to Insure that all significant risks will be identified, B. Internal auditors must apply the care and skill expected of a reasonably prudent and competent internal auditor...
What should an Architect recommend?
Universal Containers (UC) has many different business units, all requesting new projects to be built into a single Salesforce Org. UC management is concerned with a lack of appropriate project properties and roadmap for the Salesforce ecosystem. What should an Architect recommend?A . Use design Standards for Governance. B. Create...
Which of the following commands would be BEST for the administrator to use to continue troubleshooting this problem?
Joe, a user, reports that he is no longer able to write files to his home directory. Upon inspection, the Linux administrator discovers that attempting to create a new file gives the following error: No space left on device. However, the disk and partition are not full. Which of the...
When disposing of an IT asset through a vendor, what documentation should be attached to the retired asset's record as proof of adherence to environmental, regulatory, and legal requirements?
When disposing of an IT asset through a vendor, what documentation should be attached to the retired asset's record as proof of adherence to environmental, regulatory, and legal requirements?A . Certificate of discharge B. Certificate of decommission C. Certificate of destruction D. Certificate of disposal E. Certificate of retirementView AnswerAnswer:...
During the OSI layer 3 step of the encapsulation process, what is the Protocol Data Unit (PDU) called when the IP stack adds source (sender) and destination (receiver) IP addresses?
During the OSI layer 3 step of the encapsulation process, what is the Protocol Data Unit (PDU) called when the IP stack adds source (sender) and destination (receiver) IP addresses?A . Frame B. Segment C. Packet D. DataView AnswerAnswer: C Explanation: The IP stack adds source (sender) and destination (receiver)...