Which of the following types of controls does this BEST describe?

A high-security defense installation recently began utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?A . DeterrentB . PreventiveC . DetectiveD . CompensatingView AnswerAnswer: A

January 15, 2018 No Comments READ MORE +

Which two statements are true about VM encryption when the KMS is not available?

An administrator is using virtual machine encryption in their vSphere 6.5 environment. The Key Management Server (KMS) has experienced a critical failure. Which two statements are true about VM encryption when the KMS is not available? (Choose two.)A . VMs will shut down gracefully in the event of a KMS...

January 15, 2018 No Comments READ MORE +

Which two options accurately describe the implementation of Fibre Channel domain IDs? (Choose two.)

Which two options accurately describe the implementation of Fibre Channel domain IDs? (Choose two.)A . are assigned on a per-line card basisB . must be unique on all of the Fibre Channel switches in the fabricC . are assigned on a per switch basisD . are assigned on a per-VSAN...

January 15, 2018 No Comments READ MORE +

What effect does deleting the parent record have on any child records?

You configure a 1:N relationship between two entities and set the cascade rule for deletion to Referential. What effect does deleting the parent record have on any child records?A . The child records remain but the link to the parent record is removed.B . The parent record cannot be deleted...

January 15, 2018 No Comments READ MORE +

Which statement about LLDP is true?

Which statement about LLDP is true?A . It is a Cisco proprietary protocolB . It is configured in global configuration mode.C . The LLDP update frequency is a fixed value.D . It runs over the transport layer.View AnswerAnswer: B

January 15, 2018 No Comments READ MORE +

Which tool should you use on Computer1?

Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series....

January 15, 2018 No Comments READ MORE +

What is the best way to verify that a host has a path to other hosts in different networks?

What is the best way to verify that a host has a path to other hosts in different networks?A . Ping the loopback address.B . Ping the default gateway.C . Ping the local interface address.D . Ping the remote network.View AnswerAnswer: D Explanation: Ping is a tool that helps to...

January 15, 2018 No Comments READ MORE +

How should you complete the relevant code?

HOTSPOT You are developing an Azure cloud service for a company. The cloud service monitors a queue for incoming messages and then processes invoices based on the contents of these messages. Some messages are formed incorrectly and cause exceptions. There is no time limit for how long the service takes...

January 15, 2018 No Comments READ MORE +

You manage an Office 365 tenant. You plan to deploy Office 365 ProPlus

HOTSPOT You manage an Office 365 tenant. You plan to deploy Office 365 ProPlus. You create the following deployment configuration file. Use the drop-down menus to select the answer choice that answers each question or to select the answer choice that completes each statement, based on the information presented in...

January 15, 2018 No Comments READ MORE +

Which of the following could best prevent this from occurring again?

During a routine audit, it is discovered that someone has been using a stale administrator account to log into a seldom used server. The person has been using the server to view inappropriate websites that are prohibited to end users. Which of the following could best prevent this from occurring...

January 15, 2018 No Comments READ MORE +