Which switch feature prevents traffic on a LAN from being overwhelmed by continuous multicast or broadcast traffic?
Which switch feature prevents traffic on a LAN from being overwhelmed by continuous multicast or broadcast traffic?A . storm controlB . port securityC . VTP pruningD . VLAN trunkingView AnswerAnswer: A Explanation: A traffic storm occurs when packets flood the LAN, which creates excessive traffic and degrades network performance. The...
What are the advantages of Session Manager?
Avaya Aura Session Manage has a number of advantages, such as providing a single, centralized dial plan. What are the advantages of Session Manager?A . Provide traditional analog trunks for terminal devicesB . Hierarchical management of the terminal and users within the enterpriseC . Provide SIP routing across multi-vendor devicesD...
Recently the company network often attacked by ARP, in order to curb ARP attacks, which of the following technique can we use? (Multiple choice)
Recently the company network often attacked by ARP, in order to curb ARP attacks, which of the following technique can we use? (Multiple choice)A . DAIB . DHCP snoopingC . uRPFD . static MAC address bindingE . Port isolationView AnswerAnswer: ABE
Based on the exhibited routing table, how will packets from a host within the 192.168.10.192/26 LAN be forwarded to 192.168.10.1?
Refer to the exhibit. Based on the exhibited routing table, how will packets from a host within the 192.168.10.192/26 LAN be forwarded to 192.168.10.1?A . The router will forward packets from R3 to R2 to R1.B . The router will forward packets from R3 to R1 to R2.C . The...
An administrator has been investigating the way in which an actor had been exfiltrating confidential data from a web server to a foreign host. After a thorough forensic review, the administrator determined the server’s BIOS had been modified by rootkit installation. After removing the rootkit and flashing the BIOS to a known good state, which of the following would BEST protect against future adversary access to the BIOS, in case another rootkit is installed?
An administrator has been investigating the way in which an actor had been exfiltrating confidential data from a web server to a foreign host. After a thorough forensic review, the administrator determined the server’s BIOS had been modified by rootkit installation. After removing the rootkit and flashing the BIOS to...
How can the user configure access from both the EC2 instances to RDS?
A user has launched one EC2 instance in the US East region and one in the US West region. The user has launched an RDS instance in the US East region. How can the user configure access from both the EC2 instances to RDS?A . It is not possible to access RDS...
Which three management protocols does MPP support? (Choose three.)
Which three management protocols does MPP support? (Choose three.)A . SSHB . SMTPC . NetFlowD . TelnetE . SCPF . SNMPView AnswerAnswer: A, D, F
Which of the following would be the BEST method of updating this application?
An organization relies heavily on an application that has a high frequency of security updates. At present, the security team only updates the application on the first Monday of each month, even though the security updates are released as often as twice a week. Which of the following would be...
What happens to the 1/0 operations while you take a database snapshot?
What happens to the 1/0 operations while you take a database snapshot?A . 1/0 operations to the database are suspended for an hour while the backup is in progress.B . 1/0 operations to the database are sent to a Replica (if available) for a few minutes while the backup is in progress.C ....
Which network component would issue the CoA?
Which network component would issue the CoA?A . switchB . endpointC . Admin NodeD . Policy Service NodeView AnswerAnswer: D