Which component triggers the quarantine of an infected endpoint?

Which component triggers the quarantine of an infected endpoint?A . ALGB . firewallC . Policy EnforcerD . switchView AnswerAnswer: C

June 7, 2019 No Comments READ MORE +

Which two pieces of information should be included in an RFP response? (Choose two.)

Which two pieces of information should be included in an RFP response? (Choose two.)A . a list of contributing material including technical publications, training guides, and courseware used to build the proposed designB . design details including information about the devices, protocols, and technologies included in the proposed designC ....

June 7, 2019 No Comments READ MORE +

Which statement is true in this situation?

You are designing a WAN implementation to securely connect two remote sites to the corporate office. A public Internet connection will be used for the connections. Which statement is true in this situation?A . The connection should be secured using IPsec.B . The WAN edge devices must support MPLD ....

May 31, 2019 No Comments READ MORE +

Which two features would cause latency in a WAN connection? (Choose two.)

Which two features would cause latency in a WAN connection? (Choose two.)A . IPSB . syslogC . telemetryD . UTM antivirusView AnswerAnswer: AD

May 27, 2019 No Comments READ MORE +

What is the first step of business continuity planning?

What is the first step of business continuity planning?A . know your networkB . test the planC . assess the riskD . formulate the planView AnswerAnswer: A

May 26, 2019 No Comments READ MORE +

For which purpose would you collect this information?

You are in the process of developing a business continuity plan for your network design. You must analyze data about weather patterns, maintenance history pertaining to leased buildings, and the frequency of power failures. For which purpose would you collect this information?A . risk assessmentB . redundancyC . high availabilityD...

May 25, 2019 No Comments READ MORE +

What are three types of automation scripts used on a Junos device? (Choose three.)

What are three types of automation scripts used on a Junos device? (Choose three.)A . op scriptsB . commit scriptsC . boot scriptsD . event scriptsE . control scriptsView AnswerAnswer: ABD

May 22, 2019 No Comments READ MORE +

Which statement is true in this scenario?

You are performing a risk assessment for a network design. Which statement is true in this scenario?A . Some risks can be safely ignored.B . The likelihood of a risk occurring should not be considered.C . A network must be designed for an uptime of five nines.D . All identified...

May 21, 2019 No Comments READ MORE +

What are three components of an RFP? (Choose three.)

What are three components of an RFP? (Choose three.)A . general information about the existing network environmentB . a list of devices to meet the design requirementsC . a list of design requirementsD . a list of available IP addresses within their current IP allocationE . the types of solutions...

May 21, 2019 No Comments READ MORE +

In this scenario, which statement is true?

You are evaluating an existing network to determine requirements for a network upgrade. In this scenario, which statement is true?A . A network baseline identifies devices that do not have redundant components.B . A network baseline identifies traffic growth patterns across network devices.C . A network baseline identifies how many...

May 19, 2019 No Comments READ MORE +