Which well-known port is associated with the Simple Mail Transfer Protocol?

Which well-known port is associated with the Simple Mail Transfer Protocol?A . 143B . 25C . 997D . 40View AnswerAnswer: B

August 6, 2019 No Comments READ MORE +

Which protocol converts voice into a digital signal?

Which protocol converts voice into a digital signal?A . IVOB . VoIPC . SNMPD . IGMPView AnswerAnswer: B

August 5, 2019 No Comments READ MORE +

To which type of organization does the PCI DSS apply?

To which type of organization does the PCI DSS apply?A . any organization that accepts, transmits, or stores any cardholder dataB . organizations that only accept cardholder data regardless of size or number of transactionsC . only organization larger than 100 employees that accept, transmit, or store any cardholder dataD...

August 3, 2019 No Comments READ MORE +

What does a hypervisor enable?

What does a hypervisor enable?A . high-speed searching of already aggregated security log filesB . high-speed aggregation and viewing of security log filesC . multiple physical machines to be configured into a high-performance clusterD . multiple guest operating systems to run on a single physical machineView AnswerAnswer: D

August 2, 2019 No Comments READ MORE +

Match the task for server settings in group mapping with its order in the process

DRAG DROP Match the task for server settings in group mapping with its order in the process. View AnswerAnswer:

July 29, 2019 No Comments READ MORE +

What is a component of a public key infrastructure?

What is a component of a public key infrastructure?A . Key Distribution CenterB . KDC ticketC . SSH keyD . certificate authorityView AnswerAnswer: D

July 27, 2019 No Comments READ MORE +

Which option describes a characteristic of a distributed denial-of-service attack?

Which option describes a characteristic of a distributed denial-of-service attack?A . uses multiple types of malware to corrupt system servicesB . uses a single remote host to delete data from multiple target serversC . uses a single remote host to flood a target network with trafficD . uses a botnet...

July 26, 2019 No Comments READ MORE +

Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?

Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?A . strong endpoint passwordsB . endpoint disk encryptionC . endpoint antivirus softwareD . endpoint NIC ACLsView AnswerAnswer: C

July 24, 2019 No Comments READ MORE +

Match each option with the term it describes

DRAG DROP Match each option with the term it describes. View AnswerAnswer:

July 21, 2019 No Comments READ MORE +

From which resource can a Palo Alto Networks firewall get URL category information for URLs whose categories cannot be found on the firewall?

From which resource can a Palo Alto Networks firewall get URL category information for URLs whose categories cannot be found on the firewall?A . App-ID databaseB . WildFireC . PDF fileD . PAN-DB databaseView AnswerAnswer: D

July 21, 2019 No Comments READ MORE +