If traffic matches a DLP filter with the action set to Quarantine IP Address, what action does the FortiGate take?

If traffic matches a DLP filter with the action set to Quarantine IP Address, what action does the FortiGate take?A . It blocks all future traffic for that IP address for a configured interval.B . It archives the data for that IP address.C . It provides a DLP block replacement...

January 12, 2018No CommentsREAD MORE +

Which of the following hardware tools would be used?

Lisa, a technician, is tasked to monitor various analog POTS lines for voice activity. Which of the following hardware tools would be used?A . Butt setB . Toner probeC . Wire mapperD . Cable certifierView AnswerAnswer: A

January 12, 2018No CommentsREAD MORE +

In Route 53, what does a Hosted Zone refer to?

In Route 53, what does a Hosted Zone refer to?A .  A hosted zone is a collection of geographical load balancing rules for Route 53.B .  A hosted zone is a collection of resource record sets hosted by Route 53.C .  A hosted zone is a selection of specific resource...

January 12, 2018No CommentsREAD MORE +

While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?

Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?A . IPSec Phase 1 is established between 10.10.10.2 and 10.1.1.5.B . IPSec Phase 2 is established between 10.10.10.2 and 10.1.1.5.C . IPSec Phase 1 is down due to...

January 12, 2018No CommentsREAD MORE +

What is a valid HSRP virtual MAC address?

What is a valid HSRP virtual MAC address?A . 0000.5E00.01A3B . 0007.B400.AE01C . 0000.0C07.AC15D . 0007.5E00.B301View AnswerAnswer: C Explanation: Hot Standby Router Protocol Features and Functionality http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094a91.shtml HSRP Addressing In most cases when you configure routers to be part of an HSRP group, they listen for the HSRP MAC address...

January 12, 2018No CommentsREAD MORE +

Which of the following BEST describes the differences between VLAN hopping and session hijacking?

Which of the following BEST describes the differences between VLAN hopping and session hijacking?A . VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commandsB . VLAN hopping is a brute force attack executed...

January 12, 2018No CommentsREAD MORE +

The suggested depth of installing E900 server's cabinet is:

The suggested depth of installing E900 server's cabinet is:A . 1mB . 1.2mC . 1.4mD . No requirementView AnswerAnswer: B

January 12, 2018No CommentsREAD MORE +

Which two actions should you recommend?

You are designing an Azure Web App that includes many static content files. The application is accessed from locations all over the world by using a custom domain name. You need to recommend an approach for providing access to the static content with the least amount of latency. Which two...

January 12, 2018No CommentsREAD MORE +

Which configuration should you use?

You are implementing a SQL Server 2016 five-node failover cluster. You need to choose a quorum configuration. Which configuration should you use?A . Distributed File System (DFS)B . Node MajorityC . Cluster Shared Volume (CSV)D . Node and Disk MajorityView AnswerAnswer: D Explanation: Node and Disk Majority (recommended for clusters...

January 12, 2018No CommentsREAD MORE +

How to verify that TACACS+ connectivity to a device?

How to verify that TACACS+ connectivity to a device?A . You successfully log in to the device by using the local credentials.B . You connect to the device using SSH and receive the login prompt.C . You successfully log in to the device by using ACS credentials.D . You connect...

January 12, 2018No CommentsREAD MORE +