The main method of Defense cache server DNS Request Flood is to use the DNS source authentication.

The main method of Defense cache server DNS Request Flood is to use the DNS source authentication.A . TRUEB . FALSEView AnswerAnswer: A

May 9, 2018 No Comments READ MORE +

Which of the following is the BEST response?

A security audit revealed that port 389 has been used instead of 636 when connecting to LDAP for the authentication of users. The remediation recommended by the audit was to switch the port to 636 wherever technically possible. Which of the following is the BEST response?A . Correct the audit....

May 9, 2018 No Comments READ MORE +

When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?

When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?A . snoopB . tcpdumpC . monitorD . tailView AnswerAnswer: B

May 9, 2018 No Comments READ MORE +

Which three options are switchport config that can always avoid duplex mismatch error between the switches? (Choose Three.)

Which three options are switchport config that can always avoid duplex mismatch error between the switches? (Choose Three.)A . set both side on auto-negotationB . set both sides on half-duplexC . set one side auto and other side half-duplexD . set both side of connection to full-duplexE . set one...

May 9, 2018 No Comments READ MORE +

What does this red "X" indicate?

A Cisco TelePresence System 1300 Series endpoint is in the process of booting and the engineer notices a red "X" on the screen for Step 6 in the boot process. What does this red "X" indicate?A . The endpoint failed to load its firmware.B . There is an error with...

May 9, 2018 No Comments READ MORE +

Is the encryption of connections between my application and my DB Instance using SSL for the MySQL server engines available?

Is the encryption of connections between my application and my DB Instance using SSL for the MySQL server engines available?A . YesB . Only in VPCC . Only in certain regionsD .  NoView AnswerAnswer: A

May 9, 2018 No Comments READ MORE +

Which of the following authentication modes does VRRP use?

Which of the following authentication modes does VRRP use?A . No authenticationB . Simple text passwordC . MD5D . CHAPView AnswerAnswer: ABC

May 9, 2018 No Comments READ MORE +

Which technology should you use?

Case Study This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are...

May 9, 2018 No Comments READ MORE +

Which of the following protocols is the technician MOST likely to consider?

A network technician is considering opening ports on the firewall for an upcoming VoIP PBX implementation. Which of the following protocols is the technician MOST likely to consider? (Choose three.)A . SIPB . NTPD . 323E . SMBF . ICMPG . RTPH . IPSec . RDPView AnswerAnswer: A,C,F

May 9, 2018 No Comments READ MORE +

What should you do?

You are the Office 365 administrator for your company. The company has a single Active Directory Domain Services domain. As part of the Office 365 deployment, the company is preparing to deploy Office Telemetry. You need to disguise file names and document titles, while still collecting the telemetry data. What...

May 9, 2018 No Comments READ MORE +