To which undesirable condition can router R1 be vulnerable?

Refer to the exhibit. To which undesirable condition can router R1 be vulnerable?A . Denial of service attacksB . Unicast floodingC . Man-in-the-middle attacksD . Asymmetric routingE . IP address spoofingView AnswerAnswer: A

June 25, 2018 No Comments READ MORE +

How long does an AWS free usage tier EC2 last for?

How long does an AWS free usage tier EC2 last for?A .  ForeverB .  12 Months upon signupC .  1 Month upon signupD .  6 Months upon signupView AnswerAnswer: B Explanation: The AWS free usage tier will expire 12 months from the date you sign up. When your free usage...

June 25, 2018 No Comments READ MORE +

What is the cause for this misconfiguration?

Scenario Refer to the topology. Your company has connected the routers R1. R2. and R3 with serial links. R2 and R3 are connected to the switches SW1 and SW2, respectively. SW1 and SW2 are also connected to the routers R4 and R5. The EIGRP routing protocol is configured. You are...

June 25, 2018 No Comments READ MORE +

Which option lists cloud deployment models?

Which option lists cloud deployment models?A . Private, public, hybrid, sharedB . Private, public, hybridC . IaaS, PaaS, SaaSD . Private, public, hybrid, communityView AnswerAnswer: D Explanation: https://www.ibm.com/developerworks/community/blogs/722f6200-f4ca-4eb3- 9d64­8d2b58b2d4e8/ entry/4_Types_of_Cloud_Computing_Deployment_Model_You_Need_to_K now1 ?lang=en

June 25, 2018 No Comments READ MORE +

What should you do?

You are designing a SQL Server database for an order fulfillment system. You create a table named Sales.Orders by using the following script: Each order is tracked by using one of the following statuses: - Fulfilled - Shipped - Ordered - Received You need to design the database to ensure...

June 25, 2018 No Comments READ MORE +

Which four actions should you perform in sequence?

DRAG DROP You are the administrator for an Office 365 tenant. All employees have Exchange Online mailboxes. You have a user named User1 that is a member of the Compliance Management admin role group. User1 needs to move all data from local PST files into Exchange Online. Which four actions...

June 25, 2018 No Comments READ MORE +

An organization recently installed a firewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO).

An organization recently installed a firewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO).A . Allow TCP port 23B . Allow TCP port 25C . Allow TCP port 110D...

June 25, 2018 No Comments READ MORE +

Which of the following would be a reasonable response to his request?

After you recommend Amazon Redshift to a client as an alternative solution to paying data warehouses to analyze his data, your client asks you to explain why you are recommending Redshift. Which of the following would be a reasonable response to his request?A .  It has high performance at scale as data and query...

June 25, 2018 No Comments READ MORE +

You have a Cisco UCS Central cluster. An I/O error is detected in the shared storage. What is a possible cause of the issue?

You have a Cisco UCS Central cluster. An I/O error is detected in the shared storage. What is a possible cause of the issue?A . One of the Cisco UCS Central nodes is powered off.B . The wrong path selection policy is configured in VMware.C . The shared storage LUN...

June 25, 2018 No Comments READ MORE +

Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?

Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?A . Produces less false positivesB . Can identify unknown attacksC . Requires vendor updates for a new threatD . Cannot deal with encrypted network trafficView AnswerAnswer: B

June 25, 2018 No Comments READ MORE +