- All Exams Instant Download
Choose the option that best describes NIST data integrity
Choose the option that best describes NIST data integrityA . use only sha-1B . use only md5C . you must hash data & backup and compare hashesD . no need to hash data & backup and compare hashesView AnswerAnswer: C
Given the information in the graphic and assuming that the router and switch2 are configured properly, which of the following commands should be issued on switch 1 to correct this problem?
The network administrator cannot to switch 1 over a telnet session, although the hosts attached to switch 1 can ping the interface Fa0/0 of the router. Given the information in the graphic and assuming that the router and switch2 are configured properly, which of the following commands should be issued...
Which kind of profile is shown?
Refer to the exhibit. Which kind of profile is shown?A . TC WebAdminB . 323 ProfileC . TC WebAdmin SIP ProfileD . TX WebAdmin SIP ProfileE . TC WebAdmin Conference ProfileView AnswerAnswer: B
Which option is required for inline security group tag propagation?
Which option is required for inline security group tag propagation?A . Cisco Secure Access Control SystemB . hardware supportC . Security Group Tag Exchange Protocol (SXP) v4D . Cisco Identity Services EngineView AnswerAnswer: B
Which SQL elements should you include in the recommendation?
You have a SQL Server 2014 instance named SQL1. SQL1 creates error events in the Windows Application event log. You need to recommend a solution that will run an application when SQL1 logs a specific error in the Application log. Which SQL elements should you include in the recommendation? (Each...
While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?
Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?A . IKE Phase 1 main mode was created on 10.1.1.5, but it failed to negotiate with 10.10.10.2.B . IKE Phase 1 main mode has successfully negotiated between 10.1.1.5...
How many licenses should be assigned to each server?
HOTSPOT A company named Contoso, Ltd. plans to install Microsoft SQL Server on the physical servers shown in the following table. Contoso needs to acquire SQL Server 2016 Enterprise licenses for the servers. How many licenses should be assigned to each server? To answer, select the appropriate options in the...
What IPSec mode is used to encrypt traffic between a server and VPN endpoint?
What IPSec mode is used to encrypt traffic between a server and VPN endpoint?A . tunnelB . TrunkC . AggregatedD . QuickE . TransportView AnswerAnswer: E
Which protocol is used for voice bearer traffic?
Which protocol is used for voice bearer traffic?A . MGCPB . RTPC . SCCPD . CDPE . ICMPView AnswerAnswer: B
Which action does the ping 172.18.1.1 size 5 command perform?
Which action does the ping 172.18.1.1 size 5 command perform?A . It sends only five ping requests to the 172.18.1.1 destination.B . It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.C . It sends five rapid ping requests to the 172.18.1.1 destination.D ....