Which term represents a weakness in a system that could lead to the system being compromised?

Which term represents a weakness in a system that could lead to the system being compromised?A . vulnerabilityB . threatC . exploitD . riskView AnswerAnswer: A

August 12, 2018 No Comments READ MORE +

Which dial-peer configuration command resolves this issue?

Callers inform you that they hear a second dial tone after dialing the number 4085550123. Which dial-peer configuration command resolves this issue?A . answer-address 408555....B . destination-pattern 91[2-9]..[2-9].....C . forward-digits allD . direct-inward-dialView AnswerAnswer: D

August 12, 2018 No Comments READ MORE +

Which Cisco technology combats viruses and malware with virus outbreak filters that are downloaded from Cisco SenderBase?

Which Cisco technology combats viruses and malware with virus outbreak filters that are downloaded from Cisco SenderBase?A . ASAB . WSAC . Secure mobile accessD . IronPort ESAE . SBAView AnswerAnswer: D

August 12, 2018 No Comments READ MORE +

How should you complete the Transact-SOL statements?

Notify the sales person who places an order whether or not the order was completed. You must add the following constraints to the SalesHistory table: - a constraint on the SaleID column that allows the field to be used as a record identifier - a constant that uses the ProductID...

August 12, 2018 No Comments READ MORE +

You create a custom field and set the requirement level to Business Required. For which scenarios is the requirement level enforced?

You create a custom field and set the requirement level to Business Required. For which scenarios is the requirement level enforced?A . A user creates a record through the web interface but the required field is not on the current form.B . A user creates a record by using one...

August 12, 2018 No Comments READ MORE +

Which three actions should you perform?

Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3, and Server4 that run Windows Server 2012 R2. All servers have the Hyper-V server role and the Failover Clustering feature installed. You need to replicate virtual machines from Cluster1 to Cluster2. Which...

August 12, 2018 No Comments READ MORE +

When configuring class-based WRED on Cisco routers, which WRED parameter is not user configurable on a Cisco IOS XR but is user configurable on a Cisco IOS and IOS XE?

When configuring class-based WRED on Cisco routers, which WRED parameter is not user configurable on a Cisco IOS XR but is user configurable on a Cisco IOS and IOS XE?A . the ingress or egress direction where the class-based WRED policy will be appliedB . the maximum thresholdC . the...

August 12, 2018 No Comments READ MORE +

Log management includes all the processes and techniques used to collect, aggregate, and analyze computer-generated log messages. It consists of the hardware, software, network and media used to generate, transmit, store, analyze, and dispose of log data.

Log management includes all the processes and techniques used to collect, aggregate, and analyze computer-generated log messages. It consists of the hardware, software, network and media used to generate, transmit, store, analyze, and dispose of log data.A . TrueB . FalseView AnswerAnswer: A

August 12, 2018 No Comments READ MORE +

What should you do?

You administer two instances of Microsoft SQL Server 2012. You deploy an application that uses a database on the named instance. The application is unable to connect to the database on the named instance. You need to ensure that the application can connect to the named instance. What should you...

August 12, 2018 No Comments READ MORE +

Which statement describes DLCI 17?

Refer to the exhibit. Which statement describes DLCI 17?A . DLCI 17 describes the ISDN circuit between R2 and R3.B . DLCI 17 describes a PVC on R2. It cannot be used on R3 or R1.C . DLCI 17 is the Layer 2 address used by R2 to describe a...

August 12, 2018 No Comments READ MORE +