Fill in the blank: The _________ collects logs and sends them to the _________ .
Fill in the blank: The _________ collects logs and sends them to the _________ .A . Log server; security management serverB . Log server; Security GatewayC . Security management server; Security GatewayD . Security Gateways; log serverView AnswerAnswer: D
Which two devices are supported for connecting a server to the Cisco UCS 6248 Fabric Interconnect? (Choose two.)
Which two devices are supported for connecting a server to the Cisco UCS 6248 Fabric Interconnect? (Choose two.)A . Cisco UCS 5108B . Cisco Nexus 5548PC . Cisco Nexus 2248TPD . Cisco UCS 2208XPE . Cisco Nexus 2232PPView AnswerAnswer: AD
Which of the following should the junior analyst have followed?
During a security event investigation, a junior analyst fails to create an image of a server’s hard drive before removing the drive and sending it to the forensics analyst. Later, the evidence from the analysis is not usable in the prosecution of the attackers due to the uncertainty of tampering....
Which three actions should you perform in sequence?
DRAG DROP You have an Office 365 tenant that uses an Enterprise E3 subscription. You must prevent five specific users from using Skype for Business Online to send instant messages to external users. All other users must be able to send instant messages to both internal and external users. You...
Identify the attack from following sequence of actions?
Identify the attack from following sequence of actions? Step 1: A user logs in to a trusted site and creates a new session Step 2: The trusted site stores a session identifier for the session in a cookie in the web browser Step 3: The user is tricked to visit...
If you want the Internet-facing load balancer to be connected to the Internet, where must this load balancer reside?
You need to create a load balancer in a VPC network that you are building. You can make your load balancer internal (private) or internet-facing (public). When you make your load balancer internal, a DNS name will be created, and it will contain the private IP address of the load balancer. An internal...
In the following options which frequency band range belong to China supported 5 GHZ frequency band()?
In the following options which frequency band range belong to China supported 5 GHZ frequency band()?A . 5.15~5.25GHzB . 5.25~5.35GHzC . 5.725~5.825GHzD . 5.725~5.850GHzView AnswerAnswer: D
Which two statements about RSPAN VLAN are true? (Choose two.)
Which two statements about RSPAN VLAN are true? (Choose two.)A . RSPAN VLAN must be configured in VLAN configuration mode using the remote-span command.B . RSPAN VLAN trunks can handle Spanning-Tree protocol, except for SPAN destination ports.C . RSPAN VLAN access ports can handle Spanning-Tree protocol in conjunction with SPAN...
Which of the following capabilities is only available when using enhanced SLAs?
Which of the following capabilities is only available when using enhanced SLAs?A . pause an SLAB . use security roles to control SLA creationC . track Key Performance Indicators (KPls)D . define failure actionsView AnswerAnswer: C
Which of the following tools would the technician MOST likely check to verify that the cable was crimped correctly?
After plugging a cable into a computer, a user reports there is no network access. Which of the following tools would the technician MOST likely check to verify that the cable was crimped correctly?A . Punch down toolB . Cable certifierC . Loopback plugD . Toner probeView AnswerAnswer: B