Created by - Mary Smith
Questions 1. Which of the following statement correctly describes one way SSL authentication between a client (e.g. browser) and a server (e.g. web server)?A) Only the server is authenticated while client remains unauthenticatedB) Only the client is authenticated while server remains authenticatedC) Client and server are authenticatedD) Client and server are unauthenticated2. Which of the following statement correctly describes difference between SSL and S/HTTP?A) Both works at application layer of OSI modelB) SSL works at transport layer where as S/HTTP works at application layer of OSI modelC) Both works at transport layerD) S/HTTP works at transport layer where as SSL works at the application layer of OSI model3. Which of the following is a standard secure email protection protocol?A) S/MIMEB) SSHC) SETD) S/HTTP4. Which of the following statement correctly describes the differences between tunnel mode and transport mode of the IPSec protocol?A) In transport mode the ESP is encrypted where as in tunnel mode the ESP and its header's are encryptedB) In tunnel mode the ESP is encrypted where as in transport mode the ESP and its header's are encryptedC) In both modes (tunnel and transport mode) the ESP and its header's are encryptedD) There is no encryption provided when using ESP or AH5. Which of the following is the unique identifier within and IPSec packet that enables the sending host to reference the security parameter to apply?A) SPIB) SAC) ESPD) AH Right Answer and Explanation: 1. Right Answer: AExplanation: In one way authentication only server needs to be authenticated where as in mutual authentication both the client and the server needs to be authenticated.For CISA exam you should know the information below about Secure Socket Layer (SSL) and Transport Layer Security (TLS)These are cryptographic protocols which provide secure communication on Internet. There are only slight difference between SSL 3.0 and TLS 1.0. For general concept both are called SSL.SSL is session-connection layer protocol widely used on Internet for communication between browser and web servers, where any amount of data is securely transmitted while a session is established. SSL provides end point authentication and communication privacy over the Internet using cryptography. In typical use, only the server is authenticated while client remains unauthenticated. Mutual authentication requires PKI development to clients. The protocol allows application to communicate in a way designed to prevent eavesdropping, tampering and message forging.SSL involves a number of basic phasesPeer negotiation for algorithm supportPublic-key, encryption based key exchange and certificate based authenticationSymmetric cipher based traffic encryption.SSL runs on a layer beneath application protocol such as HTTP, SMTP and Network News Transport Protocol (NNTP) and above the TCP transport protocol, which forms part of TCP/IP suite.SSL uses a hybrid hashed, private and public key cryptographic processes to secure transmission over the INTERNET through a PKI.The SSL handshake protocol is based on the application layer but provides for the security of the communication session too. It negotiates the security parameter for each communication section. Multiple session can belong to one SSL session and the participating in one session can take part in multiple simultaneous sessions.The following were incorrect answers:The other choices presented in the options are not valid as in one way authentication only server needs to be authenticated where as client will remain unauthenticated.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 3522. Right Answer: BExplanation: For your exam you should know below information about S/HTTP and SSL protocol:Secure Hypertext Transfer Protocol (S/HTTP) -As an application layer protocol, S/HTTP transmits individual messages or pages securely between a web client and server by establishing SSL-type connection. Using the https:// designation in the URL, instead of the standard http://, directs the message to a secure port number rather than the default web port address. This protocol utilizes SSL secure features but does so as a message rather than the session-oriented protocol.Secure Socket Layer (SSL) and Transport Layer Security (TLS) - These are cryptographic protocols which provide secure communication on Internet. There are only slight difference between SSL 3.0 and TLS 1.0. For general concept both are called SSL.SSL is session-connection layer protocol widely used on Internet for communication between browser and web servers, where any amount of data is securely transmitted while a session is established. SSL provides end point authentication and communication privacy over the Internet using cryptography. In typical use, only the server is authenticated while client remains unauthenticated. Mutual authentication requires PKI development to clients. The protocol allows application to communicate in a way designed to prevent eavesdropping, tampering and message forging.SSL involves a number of basic phasesPeer negotiation for algorithm supportPublic-key, encryption based key exchange and certificate based authenticationSymmetric cipher based traffic encryption.SSL runs on a layer beneath application protocol such as HTTP, SMTP and Network News Transport Protocol (NNTP) and above the TCP transport protocol, which forms part of TCP/IP suite.SSL uses a hybrid hashed, private and public key cryptographic processes to secure transmission over the INTERNET through a PKI.The SSL handshake protocol is based on the application layer but provides for the security of the communication session too. It negotiates the security parameter for each communication section. Multiple session can belong to one SSL session and the participating in one session can take part in multiple simultaneous sessions.The following were incorrect answers:The other choices presented in the options are not valid asSSL works at transport layer where as S/HTTP works at application layer of OSI model.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 3523. Right Answer: AExplanation: Secure Multipurpose Internet Mail Extension (S/MIME) is a standard secure email protocol that authenticates the identity of the sender and receiver, verifies message integrity, and ensures the privacy of message's content's, including attachments.The following were incorrect answers:SSH ''A client server program that opens a secure, encrypted command-line shell session from the Internet for remote logon. Similar to a VPN, SSH uses strong cryptography to protect data, including password, binary files and administrative commands, transmitted between system on a network. SSH is typically implemented between two parties by validating each other's credential via digital certificates. SSH is useful in securing Telnet and FTP services, and is implemented at the application layer, as opposed to operating at network layer (IPSec Implementation)SET '' SET is a protocol developed jointly by VISA and Master Card to secure payment transaction among all parties involved in credit card transactions among all parties involved in credit card transactions on behalf of cardholders and merchants. As an open system specification, SET is a application-oriented protocol that uses trusted third party's encryption and digital-signature process, via PKI infrastructure of trusted third party institutions, to address confidentiality of information, integrity of data, cardholders authentication, merchant authentication and interoperability.Secure Hypertext Transfer Protocol (S/HTTP) -As an application layer protocol, S/HTTP transmits individual messages or pages securely between a web client and server by establishing SSL-type connection. Using the https:// designation in the URL, instead of the standard http://, directs the message to a secure port number rather than the default web port address. This protocol utilizes SSL secure features but does so as a message rather than the session-oriented protocol.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 352 and 3534. Right Answer: AExplanation: ESP can be used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and(limited) traffic flow confidentiality. The set of services provided depends on options selected at the time of Security Association (SA) establishment and on the location of the implementation in a network topology. For your exam you should know the information below about the IPSec protocol:The IP network layer packet security protocol establishes VPNs via transport and tunnel mode encryption methods.For the transport method, the data portion of each packet is encrypted, encryption within IPSEC is referred to as the encapsulation security payload (ESP), it isESP that provides confidentiality over the process.In the tunnel mode, the ESP payload and its header's are encrypted. To achieve non-repudiation, an additional authentication header (AH) is applied.In establishing IPSec sessions in either mode, Security Associations (SAs) are established. SAs defines which security parameters should be applied between communicating parties as encryption algorithms, key initialization vector, life span of keys, etc. Within either ESP or AH header, respectively. An SAs is established when a 32-bit security parameter index (SPI) field is defined within the sending host. The SPI is unique identifier that enables the sending host to reference the security parameter to apply, as specified, on the receiving host.IPSec can be made more secure by using asymmetric encryption through the use of Internet Security Association and Key Management Protocol/Oakley(ISAKMP/Oakley), which allows automated key management, use of public keys, negotiation, establishment, modification and deletion of SAs and attributes. For authentication, the sender uses digital certificates. The connection is made secure by supporting the generation, authentication, distribution of the SAs and the cryptographic keys.The following were incorrect answers:The other options presented are invalid as the transport mode encrypts ESP and the tunnel mode encrypts ESP and its header's.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 3535. Right Answer: AExplanation: The Security Parameter Index (SPI) is the unique identifier that enables the sending host to reference the security parameter to apply in order to decrypt the packet.For your exam you should know the information below about the IPSec protocol:The IP network layer packet security protocol establishes VPNs via transport and tunnel mode encryption methods.For the transport method, the data portion of each packet is encrypted, encryption within IPSEC is referred to as the encapsulation security payload (ESP), it isESP that provides confidentiality over the process.In the tunnel mode, the ESP payload and its header's are encrypted. To achieve non-repudiation, an additional authentication header (AH) is applied.In establishing IPSec sessions in either mode, Security Associations (SAs) are established. SAs defines which security parameters should be applied between communicating parties as encryption algorithms, key initialization vector, life span of keys, etc. Within either ESP or AH header, respectively. An SAs is established when a 32-bit security parameter index (SPI) field is defined within the sending host. The SPI is unique identifier that enables the sending host to reference the security parameter to apply, as specified, on the receiving host.IPSec can be made more secure by using asymmetric encryption through the use of Internet Security Association and Key Management Protocol/Oakley(ISAKMP/Oakley), which allows automated key management, use of public keys, negotiation, establishment, modification and deletion of SAs and attributes. For authentication, the sender uses digital certificates. The connection is made secure by supporting the generation, authentication, distribution of the SAs and the cryptographic keys.The following were incorrect answers:SA '' Security Association (SA) defines which security parameters should be applied between communicating parties as encryption algorithms, key initialization vector, life span of keys, etc.ESP '' Encapsulation Security Payload (ESP) is used to support authentication of sender and encryption of dataAH '' Authentication Header allows authentication of a sender of a data.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 353 .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A recent audit identified duplicate software licenses and technologies. Which of the following would be MOST helpful to prevent this type of duplication in the future?A) Centralizing IT procurement and approval practicesB) Updating IT procurement policies and proceduresC) Conducting periodic inventory reviewsD) Establishing a project management office2. An IS auditor finds multiple situations where the help desk resolved security incidents without notifying IT security as required by policy. Which of the following is the BEST audit recommendation?A) Display the incident response hotline in common areas.B) Have IT security review problem management policy.C) Reinforce the incident escalation process.D) Redesign the help desk reporting process.3. After threats to a data center are identified, an IS auditor would expect management to FIRST:A) recommend required actions to executive management.B) discuss risk management practices with neighboring firms.C) implement procedures to address all identified threats.D) establish and quantify the potential effects if each threat occurs.4. During a review of information security procedures for disabling user accounts, an IS auditor discovers that IT is only disabling network access for terminated employees. IT management maintains if terminated users cannot access the network, they will not be able to access any applications. Which of the following is the GREATEST risk associated with application access?A) Unauthorized access to dataB) Inability to access dataC) Lack of segregation of dutiesD) Loss of non-repudiation5. Adopting a service-oriented architecture would MOST likely:A) inhibit integration with legacy systems.B) compromise application software security.C) facilitate connectivity between partners.D) streamline all internal processes. Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: BExplanation: 3. Right Answer: CExplanation: 4. Right Answer: DExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following is the BEST reason to reassess risk following an incident?A) To capture lessons learnedB) To identify changes in the threat environmentC) To update roles and responsibilitiesD) To accurately document risk to the organization2. Which of the following is the GREATEST benefit of integrating a security information and event management (SIEM) solution with traditional security tools such asIDs, anti-malware, and email screening solutions?A) The elimination of false positive detectionsB) A reduction in operational costsC) An increase in visibility into patterns of potential threatsD) The consolidation of tools into a single console3. An organization is -MOST at risk from a new worm being introduced through the intranet when:A) desktop virus definition files are not up to date.B) system software does not undergo integrity checks.C) hosts have static IP addresses.D) executable code is run from inside the firewall.4. Which of the following is the MOST effective way to identify changes in an information security environment?A) Continuous monitoringB) Security baseliningC) Annual risk assessmentsD) Business impact analysis5. Which of the following is the MOST effective way to detect security incidents?A) Analyze penetration test results.B) Analyze recent security risk assessments.C) Analyze vulnerability assessments.D) Analyze security anomalies. Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: DExplanation: 3. Right Answer: AExplanation: 4. Right Answer: AExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A user frequently travels with a Windows laptop and connects to several wireless networks. At a new location, the user reports that the locally shared printers are not available on the wireless connection. Which of the following would be causing the issue?A) A. The location profile is set to public.B) B. Workgroup is disabled.C) C. The proxy settings are misconfigured.D) D. Remote assistance is not configured.2. Which of the following identifies traffic based upon its physical network address?A) A. PhishingB) B. HashingC) C. MAC filteringD) D. Geotracking3. Which of the following is the BEST license type to comply with end user licensing agreement (EULA) terms for commercial software used by multiple users in a corporate environment?A) A. Commercial licenseB) B. Enterprise licenseC) C. Seat licenseD) D. Open source license4. A technician has been informed by the IT security manager that a vulnerability has been discovered in the wireless router. The vulnerability could allow an attacker to take remote control of the device. Which of the following should the technician perform to address the issue?A) A. Power off the deviceB) B. Install an add-on cardC) C. Update the WiFi antennaD) D. Update firmware5. Joe, a technician, arrives onsite at a customer-s home. Upon entering the home, Joe notices an unpleasant odor. In response to this, Joe pinches his nose and holds his breath. After Joe leaves, the customer reports the behavior to Joe's supervisor. The supervisor decides the issue must be addressed. Which of the following topics would the supervisor be MOST likely to cover?A) A. Maintaining good communications with the customerB) B. Maintaining good personal hygieneC) C. Avoiding being judgmentalD) D. Avoid dismissing the customer-s problems Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: DExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following statements is valid in the file /etc/resolv.conf?A) A. order hosts,bindB) B. 192.168.168.4 dns-serverC) C. hosts: files,dnsD) D. domain example.com2. Which of the following is a correct entry in the /etc/hosts file?A) A. localhost 127.0.0.1 localhost.localdomainB) B. localhost.localdomain localhost 127.0.0.1C) C. localhost localhost.localdomain 127.0.0.1D) D. 127.0.0.1 localhost.localdomain localhostE) E. localhost.localdomain 127.0.0.1 localhost3. What is the purpose of the dig command?A) A. It can be used as a tool for querying DNS servers.B) B. It can be used for searching through indexed file content.C) C. It can be used to look for open ports on a system.D) D. It can be used to ping all known hosts on the current subnet.4. When issuing the command ifconfig eth0 192.168.1.20/24 up, which of the following happens? (Choose TWO correct answers.)(Select 2answers)A) A. The address 192.168.1.20 is associated with the interface eth0.B) B. A network route to 192.168.1.0 with the netmask 255.255.255.0 pointing directly to eth0 is created.C) C. 192.168.1.1 is probed for router functionality and, in case of success, it is added to the list of default routers.D) D. The addresses from 192.168.1.20 to 192.168.1.24 are activated on the interface eth0.E) E. If eth0 was configured with a previous IP address, it is retained in addition to adding the new address5. Given the following routing tableKernel IP routing table -Destination Gateway Genmask Flags Metric Ref Use Iface192.168.178.0 0.0.0.0 255.255.255.0 U 9 0 0 wlan0Why does the command route add default gw 192.168.1.1 fail?A) A. Because there is no route to 192.168.1.1.B) B. Because only one route can exist at a time.C) C. Because there is already a default route.D) D. Because default routes can not be set manually.E) E. Because default routes must be set with ifconfig. Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: DExplanation: 3. Right Answer: AExplanation: 4. Right Answer: A,BExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of:A) Passive reconnaissanceB) PersistenceC) Escalation of privilegesD) Exploiting the switch2. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol. Which of the following configurations should the instructor implement?A) WPA2B) WPAC) EAPD) WEP3. Ann,a college professor,was recently reprimanded for posting disparaging remarks re-grading her coworkers on a web site. Ann stated that she was not aware that the public was able to view her remakes. Which of the following security-related trainings could have made Ann aware of the repercussions of her actions?A) Data Labeling and disposalB) Use of social networkingC) Use of P2P networkingD) Role-based training4. Ann,a customer,is reporting that several important files are missing from her workstation. She recently received communication from an unknown party who is requesting funds to restore the files. Which of the following attacks has occurred?A) RansomwareB) KeyloggerC) Buffer overflowD) Rootkit5. Ann. An employee in the payroll department,has contacted the help desk citing multiple issues with her device,including: Slow performance Word documents,PDFs,and images no longer opening A pop-up Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice,she had to click several security warnings to view it in her word processor. With which of the following is the device MOST likely infected?A) SpywareB) Crypto-malwareC) RootkitD) Backdoor Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: DExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A company is formally adhering to the principles of the UN Global Compact. After a review of their supply chain, they have found that a key supplier is in violation of the compact. The best action for the company to do first is:A) do nothing. The company is not responsible for compliance of suppliers.B) replace the supplier as soon as possible with a compliant supplier.C) notify the supplier of non-compliance.D) require the supplier to become compliant.2. A company closely monitors supplier performance and notices recent late deliveries from one supplier. The supplier discloses flood damage at the plant. The company quickly shifts sourcing to a new supplier and has minimal loss of sales. Which of the following risk strategies reflects the company's actions?A) Achieving low cost through reactionB) Creating an adaptive supply chain communityC) Reducing supply chain vulnerabilityD) Investing in redundancy3. A company ships from its manufacturing facilities directly to its warehouses. If the number of warehouses increases, transportation costs between manufacturing facilities and warehouses most likely will:A) increase.B) decrease.C) not change.D) become less predictable.4. Which of the following outcomes occurs when direct shipping is used instead of a distribution network?A) Outbound transportation cost is reduced.B) Inventory velocity is reduced.C) Order-fill rates are reduced.D) Inventory obsolescence is reduced.5. Which of the following factors typically is most important in successfully implementing sales and operations planning (S&OP)?A) Involvement of specialists from all functional groups within an organizationB) Creation of a dedicated S&OP organizational unitC) Involvement and accountability at senior management levelD) Focus on 3 months to 18 months in the future Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: BExplanation: 3. Right Answer: AExplanation: 4. Right Answer: DExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. During the process of starting a Python network telemetry collector, which command starts the Cisco bigmuddy-network-telemetry-collector from GitHub?A) streaming telemetryB) telemetry_receiver.py --ip-address --portC) telemetry_receiver.py --destination --urlD) model driven telemetry2. Which two statements describe the authentication method used with Cisco Intersight REST API Requests? (Choose two.)(Select 2answers)A) The Cisco Intersight Web service verifies the signature of incoming request with the RSA public key for the API Key IDB) The incoming REST API request is challenged by the Cisco Intersight Web service with a request for the RSA private keyC) The REST API request message body is encoded as a SHA384 hash and then signed with the API Key IDD) The REST API request contains a base64-encoded signature of the message content and headers3. What is a description of a Cisco UCS Director script module?A) place to store external scripts that are not related to Cisco UCS DirectorB) place to store custom workflow scripts, jars, and custom lists of values for use in custom workflow tasksC) place to store imported scripts, Bash, and custom Python code for use in custom workflow tasksD) function to convert internal workflow tasks into Python scripts4. What are two capabilities of the DCNM REST API? (Choose two.)(Select 2answers)A) uses bearer key authorizationB) uses basic authentication without encoding for username and passwordC) uses the dcnm-token header for requests authentication after initial basic authenticationD) is separated into Classic LAN, LAN Fabric, Media Controller, and SAN Management categories5. Which action allows Docker daemon persistence during switchover on the Cisco Nexus 9500 Series Switches running Cisco NX-OS?A) Change the Docker configuration to include the live restore option.B) Copy the dockerpart file manually to the standby supervisor after performing the switchover.C) Copy the dockerpart file manually to the standby supervisor before performing the switchoverD) The system takes automatic action Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: B,DExplanation: 3. Right Answer: BExplanation: 4. Right Answer: C,DExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. You need to setup a Cross Connect with AWS(Amazon Web Service) Direct Connect. You already have the necessary equipment in place. You now need to complete the connection process. How can you achieve this?A) Raise a support ticket with AWSB) Raise a AWS(Amazon Web Service) Direct Connect request In the AWS(Amazon Web Service) ConsoleC) Contact your providerD) Contact an AWS(Amazon Web Service) Partner2. A company currently has acquired another smaller company. Both companies have their presence in AWS. There is a requirement to ensure traffic flows from VPC A in the parent company to a security VPC B in the same parent company. And then the traffic can flow to VPC C in the acquired company. How can you accomplish this transit flow?A) Create a VPC Peering connection between VPC A and VPC C. Create a VPN connection between VPC A and VPCB) Create a VPC Peering connection between VPC A and VPC C. Create another VPC peering connection between VPC B and VPC CC) Create a VPC Peering connection between VPC A and VPC B. Create a VPN connection between VPC B and VPCD) Create a VPC Peering connection between VPC A and VPC B. Create another VPC peering connection between VPC Band VPCC3. Your company currently has a VPC hosted in AWS. There is a private hosted zone in place for the instances in this VPC. You need your On-premise servers to be able to resolve DNS requests for Instances in the VPC. You need to do this with the least amount of effort. What steps would you. Choose 2 answers from the options given below.(Select 2answers)A) Setup a Simple AD Instance in AWS.B) Make your On-premise servers point to the Simple AD InstanceC) Setup an Active Directory Domain Controller in the AWS(Amazon Web Service) VPCD) Make your On-premise servers point to the new Domain Controller4. You are setting up a VPN software on an EC2 Instance which will be used for VPN connections. Which of the following Is an important aspect that should be set on the EC2 Instance?A) Enable route propagation in a Virtual Private Cloud (VPC) subnet route table.B) Enable source destination check on the Amazon EC2 instance.C) Disable source destination check on the Amazon EC2 instanceD) Enable enhanced networking mode on the Amazon EC2 instance.5. Your planning on setting up a VPC with Subnets. The EC2 Instances hosted in the VPC needs to get the time from a custom NTP server. How can you accomplish this?A) Define a resource record in Route 53 and provide the NTP server nameB) Create a DHCP Options set and provide the NTP server nameC) Assign the NTP server in the Subnet configurationD) Use an Application Load Balancer and then provide the NW server as part of the ALB configuration. Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: CExplanation: 3. Right Answer: A,BExplanation: 4. Right Answer: CExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review