Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?A . SmartView MonitorB . SmartEventC . SmartUpdateD . SmartDashboardView AnswerAnswer: B Explanation: SmartEvent correlates logs from all Check Point enforcement points, including end-points, to identify suspicious activity from the clutter....
Which option is the Cisco recommended over-subscription ratio for uplinks between the distribution and core layers?
An engineer is considering uplink bandwidth over-subscription in a Layer 3 network design. Which option is the Cisco recommended over-subscription ratio for uplinks between the distribution and core layers?A . 3 to 1B . 4 to 1C . 6 to 1D . 8 to 1View AnswerAnswer: B Explanation: Network oversubscription...
A network engineer has been asked to follow a top down design approach. What layer of the OSI model is used to start the design?
A network engineer has been asked to follow a top down design approach. What layer of the OSI model is used to start the design?A . physicalB . networkC . transportD . applicationView AnswerAnswer: D
Which type of boot is supported by Cisco for applications?
Which type of boot is supported by Cisco for applications?A . USB flashB . SD cardsC . removable mediaD . DASView AnswerAnswer: D
Between Huawei N8000 (V200R001) cluster NAS two nodes, which road redundancy is between the heartbeat link?
Between Huawei N8000 (V200R001) cluster NAS two nodes, which road redundancy is between the heartbeat link?A . 1B . 2C . 3D . 4View AnswerAnswer: B
Which of the following pairs of statements is true in terms of configuring MD authentication?
Which of the following pairs of statements is true in terms of configuring MD authentication?A . Interface statements (OSPF, EIGRP) must be configured; use of key chain in OSPFB . Router process (OSPF, EIGRP) must be configured; key chain in EIGRPC . Router process (only for OSPF) must be configured;...
How should you complete the relevant Windows PowerShell command?
HOTSPOT Contoso, Ltd., has an Office 365 tenant. All employees have Exchange Online mailboxes. You have an existing ActiveSync mailbox policy named Contoso-ActiveSync-Policy that applies to all sales users. You must prevent Sales users from copying their Exchange contacts to the native address book of their mobile devices while they...
What Android device requirement must be met to push an application from the Google Play Store and have it silently install on a device?
What Android device requirement must be met to push an application from the Google Play Store and have it silently install on a device?A . Register with Android EnterpriseB . Google Developer accessC . G-Suite compatibleD . SupervisedView AnswerAnswer: C
Which two actions can you perform?
You manage an Office 365 tenant that uses SharePoint Online. The organization purchases a second domain name to use with SharePoint Online. You need to create a new site collection that uses the new domain name. Which two actions can you perform? Each correct answer presents a complete solution.A ....
Which configuration do you apply to a device to place interface GigabitEthernet0/0 info VRRP group 10?
Which configuration do you apply to a device to place interface GigabitEthernet0/0 info VRRP group 10?A . interface GigabitEthernet0/0 ip address 172.16.13.2 265 255.255.0 standby 10 ip 172.16.13.254 255.255.255.0 standby 10 priority 120 standby 10 preemptB . interface GigabitEthernet0/0 description to Executive Offices A 08-38338 ip address 172.16.13.2 265.255.255.0 vrrp...