_________ is a set of extensions to DNS that provide to DNS clients (resolvers) origin authentication of DNS data to reduce the threat of DNS poisoning, spoofing, and similar attacks types.

_________ is a set of extensions to DNS that provide to DNS clients (resolvers) origin authentication of DNS data to reduce the threat of DNS poisoning, spoofing, and similar attacks types.A . DNSSECB . Resource recordsC . Resource transferD . Zone transferView AnswerAnswer: A

February 23, 2018 No Comments READ MORE +

Which statement about ZigBee technology is true?

Which statement about ZigBee technology is true?A . It has low power consumption.B . It is designed only for point-to-point communications.C . It ranges up to 250 meters.D . It supports data rates up to 1 and 2 Mb/s.View AnswerAnswer: A

February 23, 2018 No Comments READ MORE +

Which statement describes the correct steps to enable Botnet Traffic Filtering on a Cisco ASA version 9.0 transparent-mode firewall with an active Botnet Traffic Filtering license?

Which statement describes the correct steps to enable Botnet Traffic Filtering on a Cisco ASA version 9.0 transparent-mode firewall with an active Botnet Traffic Filtering license?A . Enable DNS snooping, traffic classification, and actions.B . Botnet Traffic Filtering is not supported in transparent mode.C . Enable the use of the...

February 23, 2018 No Comments READ MORE +

What attribute belonging VERIS schema?

What attribute belonging VERIS schema?A . confidentiality/possessionB . integrity/authenticityC . availability/utilityView AnswerAnswer: ABC

February 23, 2018 No Comments READ MORE +

Which two statements are Datastore Cluster requirements? (Choose two.)

Which two statements are Datastore Cluster requirements? (Choose two.)A . Datastore clusters can only contain VMFS datastores.B . Datastores shared across multiple data centers cannot be included in a datastore cluster.C . NFS and VMFS datastores cannot be combined in the same datastore cluster.D . Datastore clusters must contain three...

February 23, 2018 No Comments READ MORE +

How can the kernel parameter for the maximum size of the shared memory segment (shmmax) be changed to 2GB (2147483648 Bytes) on a running system? (Choose TWO correct answers.)

How can the kernel parameter for the maximum size of the shared memory segment (shmmax) be changed to 2GB (2147483648 Bytes) on a running system? (Choose TWO correct answers.)A . Edit /etc/shmmax and set the parameter to 2147483648.B . sysctl shmmax=2147483648C . sysctl kernel.shmmax=2147483648D . echo 2147483648 > /proc/sys/kernel/shmmaxE ....

February 23, 2018 No Comments READ MORE +

Where can the Citrix Administrator look for the cause of this issue?

The Helpdesk Administrator informs the Citrix Administrator that users are facing intermittent printer mapping issues in the environment. Where can the Citrix Administrator look for the cause of this issue?A . Event logs on the Delivery ControllersB . Event logs on the VDA machinesC . Event logs on the StoreFront...

February 23, 2018 No Comments READ MORE +

When no spanning-tree bpdu guard enable is configured in f0/7, which is true? (There’s an exhibit that shows f0/7 receive BPDU.)

When no spanning-tree bpdu guard enable is configured in f0/7, which is true? (There’s an exhibit that shows f0/7 receive BPDU.)A . We have to configure shutdown and no shutdown.B . Have to use errdisable recoveryC . UDLD resetD . Network administrator must disable spanning-tree protocolView AnswerAnswer: A

February 23, 2018 No Comments READ MORE +

Which utility can you use to troubleshoot and determine the timeline of packet changes in a data path within a Cisco firewall?

Which utility can you use to troubleshoot and determine the timeline of packet changes in a data path within a Cisco firewall?A . packet tracerB . pingC . tracerouteD . SNMP walkView AnswerAnswer: A

February 23, 2018 No Comments READ MORE +

Which statement describes the process ID that is used to run OSPF on a router?

Which statement describes the process ID that is used to run OSPF on a router?A . It is globally significant and is used to represent the AS number.B . It is locally significant and is used to identify an instance of the OSPF database.C . It is globally significant and...

February 23, 2018 No Comments READ MORE +