What type of firewall mode must be implemented?

A customer would like to implement a firewall to secure an enterprise network. However, the customer is unable to allocate any new subnets. What type of firewall mode must be implemented?A . routedB . active/standbyC . transparentD . virtualE . active/activeF . zone basedView AnswerAnswer: C

January 17, 2018 No Comments READ MORE +

Your company has an Office 365 subscription and uses Microsoft Lync Online. The environment includes the domains shown in the following image, and is configured as shown in the exhibit. (Click the Exhibit button

HOTSPOT Your company has an Office 365 subscription and uses Microsoft Lync Online. The environment includes the domains shown in the following image, and is configured as shown in the exhibit. (Click the Exhibit button.) Lync is not deployed in a hybrid configuration. An employee requires specific Lync communication settings....

January 17, 2018 No Comments READ MORE +

Which of the following PHP values may NOT be encoded to a JavaScript literal using PHP's ext/json capabilities?

Which of the following PHP values may NOT be encoded to a JavaScript literal using PHP's ext/json capabilities?A . 'Hello, world!'B . function(){ alert("Hello, world!");}C . array{'Hello, world!')D . array('message' => 'Hello, world!')View AnswerAnswer: B

January 17, 2018 No Comments READ MORE +

To which network layer should Cisco Express Forwarding be tuned to support load balancing and to make more informed forwarding decisions?

To which network layer should Cisco Express Forwarding be tuned to support load balancing and to make more informed forwarding decisions?A . Layer 1B . Layer 2C . Layer 3D . Layer 4E . Layer 5F . Layer 6G . Layer 7View AnswerAnswer: D

January 17, 2018 No Comments READ MORE +

Your manager suggests implementing these security practices. What response should you give to this suggestion?

You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to...

January 17, 2018 No Comments READ MORE +

You must identify and isolate traffic loss. Which option do you configure to monitor EPG-to-EPG traffic within a tenant?

You must identify and isolate traffic loss. Which option do you configure to monitor EPG-to-EPG traffic within a tenant?A . SPANB . traffic mapC . tcpdumpD . atomic countersView AnswerAnswer: C

January 17, 2018 No Comments READ MORE +

What are the initial steps to configure an ACS as a TACACS server?

What are the initial steps to configure an ACS as a TACACS server?A . 1. Choose Network Devices and AAA Clients > Network Resources.2. Click Create.B . 1. Choose Network Resources > Network Devices and AAA Clients.2. Click Create.C . 1. Choose Network Resources > Network Devices and AAA Clients.2....

January 17, 2018 No Comments READ MORE +

Which three actions should you perform?

DRAG DROP A company uses Azure to host web apps. The company plans to deploy a new web app using Kubernetes cluster. You create a new resource group for the cluster. You need to deploy the application. Which three actions should you perform? View AnswerAnswer:

January 16, 2018 No Comments READ MORE +

Which statement about EIGRP request packets is true?

Which statement about EIGRP request packets is true?A . They determine whether a destination is reachableB . They are transmitted unreliablyC . They are transmitted via broadcastD . They are sent in response to queriesView AnswerAnswer: B

January 16, 2018 No Comments READ MORE +

From which application are log files required for escalating issues to Avaya support?

From which application are log files required for escalating issues to Avaya support?A . SMDRB . System MonitorC . Customer Call StatusD . Manager ReportView AnswerAnswer: B

January 16, 2018 No Comments READ MORE +