attack successful?

Recently several employees were victims of a phishing email that appeared to originate from the company president. The email claimed the employees would be disciplined if they did not click on a malicious link in the message. Which of the following principles of social engineering made this attack successful?A ....

January 13, 2018 No Comments READ MORE +

Which option lists the modes that are available for configuring UDLD on a Cisco switch?

Which option lists the modes that are available for configuring UDLD on a Cisco switch?A . normal and aggressiveB . active and aggressiveC . normal and activeD . normal and passiveE . normal and standbyView AnswerAnswer: A Explanation: The Cisco-proprietary UDLD protocol monitors the physical configuration of the links between...

January 13, 2018 No Comments READ MORE +

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?A . lowest port MAC addressB . port priority number and MAC address.C . VTP revision numberD . highest port priority number.E . path costView AnswerAnswer: E

January 13, 2018 No Comments READ MORE +

Which CLI command is used to move epsilon to a new node?

Which CLI command is used to move epsilon to a new node?A . storage failover takeoverB . cluster setupC . cluster identity modifyD . cluster modifyView AnswerAnswer: D

January 13, 2018 No Comments READ MORE +

Which NTP type designates a router without an external reefrence clock as an authoritative time source?

Which NTP type designates a router without an external reefrence clock as an authoritative time source?A . serverB . peerC . masterD . clientView AnswerAnswer: C

January 13, 2018 No Comments READ MORE +

Which statement is correct in this scenario?

You want to support multiple tenants with duplicate IP addresses for your storage system. Which statement is correct in this scenario?A . You must use different ports on your controller.B . You must create additional VLANs to use multiple tenants.C . You cannot support multiple tenants on your storage system.D...

January 13, 2018 No Comments READ MORE +

Which GET VPN component maintains security policies?

Which GET VPN component maintains security policies?A . PB . PEC . GDOID . group memberE . key serverF . CEView AnswerAnswer: E

January 13, 2018 No Comments READ MORE +

Which LIF parameter determines the ports that the LIF moves to when the current interface goes offline?

Which LIF parameter determines the ports that the LIF moves to when the current interface goes offline?A . failover-groupB . netmaskC . ipspaceD . auto-revertView AnswerAnswer: A

January 13, 2018 No Comments READ MORE +

Which two actions should you perform?

You are the Office 365 administrator for your company. The company has established the following new requirements: Members of the legal team must be able to conduct eDiscovery searches. Employees must be notified when they send email messages that contain confidential information. You need to configure the environment. Which two...

January 13, 2018 No Comments READ MORE +