What type of firewall mode must be implemented?
A customer would like to implement a firewall to secure an enterprise network. However, the customer is unable to allocate any new subnets. What type of firewall mode must be implemented?A . routedB . active/standbyC . transparentD . virtualE . active/activeF . zone basedView AnswerAnswer: C
Your company has an Office 365 subscription and uses Microsoft Lync Online. The environment includes the domains shown in the following image, and is configured as shown in the exhibit. (Click the Exhibit button
HOTSPOT Your company has an Office 365 subscription and uses Microsoft Lync Online. The environment includes the domains shown in the following image, and is configured as shown in the exhibit. (Click the Exhibit button.) Lync is not deployed in a hybrid configuration. An employee requires specific Lync communication settings....
Which of the following PHP values may NOT be encoded to a JavaScript literal using PHP's ext/json capabilities?
Which of the following PHP values may NOT be encoded to a JavaScript literal using PHP's ext/json capabilities?A . 'Hello, world!'B . function(){ alert("Hello, world!");}C . array{'Hello, world!')D . array('message' => 'Hello, world!')View AnswerAnswer: B
To which network layer should Cisco Express Forwarding be tuned to support load balancing and to make more informed forwarding decisions?
To which network layer should Cisco Express Forwarding be tuned to support load balancing and to make more informed forwarding decisions?A . Layer 1B . Layer 2C . Layer 3D . Layer 4E . Layer 5F . Layer 6G . Layer 7View AnswerAnswer: D
Your manager suggests implementing these security practices. What response should you give to this suggestion?
You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to...
You must identify and isolate traffic loss. Which option do you configure to monitor EPG-to-EPG traffic within a tenant?
You must identify and isolate traffic loss. Which option do you configure to monitor EPG-to-EPG traffic within a tenant?A . SPANB . traffic mapC . tcpdumpD . atomic countersView AnswerAnswer: C
What are the initial steps to configure an ACS as a TACACS server?
What are the initial steps to configure an ACS as a TACACS server?A . 1. Choose Network Devices and AAA Clients > Network Resources.2. Click Create.B . 1. Choose Network Resources > Network Devices and AAA Clients.2. Click Create.C . 1. Choose Network Resources > Network Devices and AAA Clients.2....
Which three actions should you perform?
DRAG DROP A company uses Azure to host web apps. The company plans to deploy a new web app using Kubernetes cluster. You create a new resource group for the cluster. You need to deploy the application. Which three actions should you perform? View AnswerAnswer:
Which statement about EIGRP request packets is true?
Which statement about EIGRP request packets is true?A . They determine whether a destination is reachableB . They are transmitted unreliablyC . They are transmitted via broadcastD . They are sent in response to queriesView AnswerAnswer: B
From which application are log files required for escalating issues to Avaya support?
From which application are log files required for escalating issues to Avaya support?A . SMDRB . System MonitorC . Customer Call StatusD . Manager ReportView AnswerAnswer: B