Which of the following risk management strategies has the organization employed?
Management is reviewing the results of a recent risk assessment of the organization’s policies and procedures. During the risk assessment it is determined that procedures associated with background checks have not been effectively implemented. In response to this risk, the organization elects to revise policies and procedures related to background...
What is the function of the peer ignore command?
What is the function of the peer ignore command?A . Deletes a BGP peer.B . Retains all configurations of the peer, and maintains the BGP peer relationship with the peer, but does not receive the routes sent from the peer.C . Retains all configurations of the peer, and maintains the...
Which of the following physical security controls is MOST likely to be susceptible to a false positive?
Which of the following physical security controls is MOST likely to be susceptible to a false positive?A . Identification cardB . Biometric deviceC . Proximity readerD . Video cameraView AnswerAnswer: C
Which cmdlet should you use to identify whether the DNS Server role is installed on Nano1?
You have a Nano Server named Nano1. Which cmdlet should you use to identify whether the DNS Server role is installed on Nano1?A . Find-NanoServerPackageB . Get-PackageC . Find-PackageD . Get-WindowsOptionalFeatureView AnswerAnswer: B
For what reason would you configure multiple security contexts on the ASA firewall?
For what reason would you configure multiple security contexts on the ASA firewall?A . To separate different departments and business units.B . To enable the use of VRFs on routers that are adjacently connected.C . To provide redundancy and high availability within the organization.D . To enable the use of...
Interfaces Ethernet 7/1-8 are members of the CORE-SW1 VDC, and CORE-7700-1 is the admin VDC. Which cause of the error is likely?
Refer to the exhibit. Interfaces Ethernet 7/1-8 are members of the CORE-SW1 VDC, and CORE-7700-1 is the admin VDC. Which cause of the error is likely?A . The FCoE VLANs associated to Ethernet 7/1-8 must be assigned to the FC-CORE-SW1 VDC in the admin VDCs.B . Interfaces Ethernet 7/1-8 must...
To which port does a firewall send secure logging messages?
To which port does a firewall send secure logging messages?A . TCP/1500B . UDP/1500C . TCP/500D . UDP/500View AnswerAnswer: A
In a typical wireless network using WPA, WPA2 or VPN, why is it still possible for a rogue client to launch a DOS attack?
In a typical wireless network using WPA, WPA2 or VPN, why is it still possible for a rogue client to launch a DOS attack?A . WPA and WPA2 are not considered strong encryption algorithms and are easily cracked.B . 802.11 management frames are easily compromised.C . Cisco Compatible Extensions v5...
Which two actions can you take to allow the network 1 72.29.224.0/24 to be reachable from peer 192.168.250.53?
Refer to the exhibit. Which two actions can you take to allow the network 1 72.29.224.0/24 to be reachable from peer 192.168.250.53? (Choose two)A . Modify the outbound route map to permit all additional traffic.B . Configure soft reconfiguration to peering 192.168.250.53C . Modify the community list to match community...
Which command should be used to create this map?
A static map to the S-AMER location is required. Which command should be used to create this map?A . frame-relay map ip 172.30.0.3 825 broadcastB . frame-relay map ip 172.30.0.3 230 broadcastC . frame-relay map ip 172.30.0.3 694 broadcastD . frame-relay map ip 172.30.0.3 387 broadcastView AnswerAnswer: B Explanation: Frame-relay...