Created by - Mary Smith
Questions 4. An end user opened a ticket, stating that though he can log in to Jabber for Windows, and presence and chat works, he cannot place phone calls using the desktop client. You investigate the user and find that no phone device is associated with the user account in Cisco Unified Communications Manager. Which device type must you create for this user to enable calling services from the Jabber for Windows desktop client?A) Cisco Jabber for TabletB) Cisco Unified Client Services FrameworkC) Cisco Unified Personal CommunicatorD) 5. How is automatic fallback enabled on a Cisco IM and Presence server?A) In IM and Presence Service Parameter Configuration > Cisco Server Recovery Manager, change the Failover parameter to TrueB) In Communications Manager Service Parameter Configuration > Cisco Server Recovery Manager, change the Enable Automatic Fallback parameter to TrueC) In the Presence Redundancy Group Configuration > Cisco Unified Communications Manager, check the Enable Automatic Fallback parameterD) Automatic fallback is enabled by default Right Answer and Explanation: 4. Right Answer: CExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. You need to have a managed threat detection service that continuously monitors for malicious or unauthorized behavior against your EC2 Instances. Which of the following can help in such a requirement?A) Amazon Cloud TrailB) Amazon Guard DutyC) Amazon VPC Flow LogsD) Amazon Cloud watch Logs2. There is a requirement to see all port scans which are occurring on a couple of EC2 instances. Which of the following can be used for such a requirement?A) AWS VPC Flow LogsB) AWS Trusted AdvisorC) AWS Cloud watch EventsD) AWS Inspector3. Your company has setup a Classic Load Balancer with EC2 Instances behind them. These EC2 Instances are spun up via an Auto scaling group. In your company there is normally a spike in traffic in the beginning and end of the day. The ELB and Auto scaling Groups have been created with the default settings. It has been noticed that there are timeouts or partially rendered pages at times. How can this be resolved?A) Change the Connection Draining timeout in the ELBB) Enable Cross Zone Load BalancingC) Change the maximum number of instances setting in the Auto scaling GroupD) Add another Auto scaling group to the ELB4. You have established a VPN connection between your on-premise and an AWS(Amazon Web Service) VPC. You need to also ensure that instances in the VPC can reach the Internet so you have also attached an Internet gateway. How would you setup the route tables to ensure traffic can flow via the VPN and the Internet?A) Setup one route table. Add one route of 0.0.0.0/0 to the Internet and another route of 0.0.0.0/0 route for the Virtual Private gateway. Attach the Route table to the subnets In the VPC.B) Setup 2 Route tables. One route table with a default route to the Internet and another one with the default route to the Virtual Private gateway. Attach the Route tables to the sub nets In the VPC.C) Setup one route table. Add one route of 0.0.0.0/0 to the Internet and one specific prefix route for the Virtual Private gateway. Attach the Route table to the subnets in the VPC.D) Setup 2 Route tables. One route table with a default route to the Internet and another one with the s prefix route to the Virtual Private gateway. Attach the Route tables to the subnets in the VPC.5. You have configured a hosted zone in Route 53. You need to have the ability to see the types of records being requested to the zone. How can you configure this?A) Configure Cloud trailB) Configure VPC Flow LogsC) Configure Cloud watch metricsD) Configure Amazon Route 53 logging Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: AExplanation: 4. Right Answer: CExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
1. Certified Ethical Hacker v11Study materialKey: D_pWUewe-96m9IJIz8ibvwDownload: Free Download Link2. Gate CourseDownload Link :- Free download3. CCNA 200-301 CBTNUGGETShttps://mega.nz/folder/uUMHwKZT#Xdh6x-cOAW8A37Paj6qCXg4. Windows Server Admins:Password: whocares*A Cloud Guru - Collections Of All Courses ????AWS Certified Solutions Architect AssociateRed Hat Certified System AdministratorServerless For BeginnersCertified SysOps Administrator AssociateIntroduction To Cloud ComputingGoogle Certified Professional Cloud Network EngineerAWS Certified Machine Learning - SpecialtyLinux Professional Institute Certificate 2 - LPIC-2Docker & Kubernetes FundamentalsPractical Guide To Hybrid Azure AD SetupAWS Certified Alexa Skill Builder SpecialtyMicrosoft Azure Cost Control On AzureIntroduction To AWSIntroduction To Jupyter NotebooksLinux Web ServicesGoogle Certified Professional Cloud DeveloperAzure Database Administrator AssociateIntroduction To Hybrid Environments On AzurePL 900 Microsoft Power Platform FundamentalsRed Hat Certified Specialist In Advanced Automation Ansible Best Practices (EX447)Red Hat Certified Specialist In Performance Tuning (EX442)Hands On With DataflowCertified Kubernetes Security Specialist (CKS)AWS Certified Data Analytics - SpecialtyIntroduction To Azure Virtual DesktopLinux File SharingDP-900 Azure Data FundamentalsIntroduction To RancherDP-100 Part 3 - Deployment And Working With SDKAWS Certified Solutions Architect - Associate (SAA-C02)AWS Certified SysOps Administrator - AssociateNetworking FoundationsDocker For DevOps - From Development To ProductionWindows Subsystem For Linux Deep DiveLinux Email Services With Cara NolteCloud Computing IntroAI-900 Microsoft Certified Azure AI FundamentalsIntroduction To OWASP Top 10 Security RisksBuilding A Continuous Integration Pipeline With Travis CIGitHub Actions Deep DiveMachine Learning For Absolute BeginnersAZ-500 Microsoft Azure Security TechnologiesDocker Quick StartIntroduction To Containers And DockerAWS Certified Database - Specialty (DBS-C01)The System Administrator’s Guide to Bash ScriptingAWS Certified Cloud PractitionerAWS Certified Developer - AssociateHands-On With HAProxy Load BalancerAWS Certified DevOps Engineer - ProfessionalLinux Foundation Certified System Administrator (LFCS)Hands-On Kubernetes TroubleshootingArchive Password for mega link : Whocareshttps://mega.nz/folder/JyR3FQYJ#Cb8M26EWYkoV7DMjR26yXQhttps://mega.nz/folder/g88TXIZC#VAzJjPdgrWlOrFUx2HxChAhttps://mega.nz/folder/aa4jEKpD#LlcGf_oDxlk2Kk7dspxjHwhttps://mega.nz/folder/V8sQgSDL#5rxfmPW1CjKbL1fzZdLgowhttps://mega.nz/folder/rPoDDCSa#lfFFpSl6Qr5dB_WV8sYKKghttps://mega.nz/folder/l1kQlYAJ#s7mJ9avAxe9JfgOz-JiAOghttps://mega.nz/folder/PfgVkISI#MYbg40R7Z0quPhRhJ-8kAQhttps://mega.nz/folder/Rp9E1bjC#_blyynhgu80iUHwxLunP9whttps://mega.nz/folder/Fs90HawY#tx72a2xPYuU0qO7BZFm4qQhttps://mega.nz/folder/DlcQmbYR#9hYWTIJEwROqz2LycvoTighttps://mega.nz/folder/8j5SXbxT#08rniw-fzobwecnnju9OIQhttps://mega.nz/folder/YmYxWKTJ#jpv2OHVZd_t0nntT08iONghttps://mega.nz/folder/wrZhGYYB#Bodridt9rjaxF1S3j_eBpAhttps://mega.nz/folder/9iRVVSRC#ErPnLGECmFJZeC-M8nt-vghttps://mega.nz/folder/5tkynDjB#iWoTxi7CIHVGdxtoOIBAaw5. Ethical Hacking course????????Link : https://mega.nz/folder/y4lDlBoY#8PfVveG-RDJ759nnynkSIg6. 50GB of Udemy Hacking Courses [ALL HACKING COURSES] ????Hacking ExploitsIntroExploitsSmashing the stackUsing Public ExploitsMetasploitConclusionHacking Mobile DevicesIntroMobile TechnologyAndroidiOSConclusionSystem HackingIntroSystem HackingGaining AccessPrivilege EscalationSpywareKeyloggersHiding in Plain SiteCover Your TracksConclusionWeb App TestingIntroIntroduction to WebGetting Ready to TestRunning Basic Web Application TestsAdvanced Web Application TestsPracticing Your SkillsConclusionDownload Link: https://mega.nz/folder/M59mzDQD#pciuQ7tSMkYeEwROCIZuLA7. CEH v10 Complete*CEH v10 Download With PDF,Tools & Videos Files*Module 00: Introduction and Table of Contentshttp://www.mediafire.com/file/qzo9ptf01lvoawf/CEH+v10+Module+00+-++Introduction+and+table+of+Contents.pdfModule 01: Introduction to Ethical Hackinghttp://www.mediafire.com/file/n88nn8e0hytki26/CEH+v10+Module+01+Introduction+to+Ethical+Hacking.pdfModule 02: Footprinting and Reconnaissancehttp://www.mediafire.com/file/mg2ebx812nx0k2d/CEH+v10+Module+02+-+Footprinting+%26amp%3B+Reconnaissance.pdfModule 03: Scanning Networkshttp://www.mediafire.com/file/593t654bmvse8as/CEH+v10+Module+03+-+Scanning+Networks.pdfModule 04: Enumerationhttp://www.mediafire.com/file/rgzufa875ptj5h5/CEH+v10+Module+04+-+Enumeration.pdfModule 05: Vulnerability Analysishttp://www.mediafire.com/file/q1ih2ge5f7e9f4q/CEH+v10+Module+05+Vulnerability+Analysis.pdfModule 06: System Hackinghttp://www.mediafire.com/file/xyh838vmn6k8r3k/CEH+v10+Module+06+System+Hacking.pdfModule 07: Malware Threatshttp://www.mediafire.com/file/of4opbvxx18hf0b/CEH+v10+Module+07+-+Malware+Threats.pdfModule 08: Sniffinghttp://www.mediafire.com/file/trgpktmr252mgl6/CEH+v10+Module+08+-+Sniffing.pdfModule 09: Social Engineeringhttp://www.mediafire.com/file/yvp9bdeideb295i/CEH+v10+Module+09+-+Social+Engineering.pdfModule 10: Denial-of-Servicehttp://www.mediafire.com/file/pj5ged9rwlg9xu7/CEH+v10+Module+10+-+Denial-of-Services.pdfModule 11: Session Hijackinghttp://www.mediafire.com/file/g1zpqxfuda1m2vq/CEH+v10+Module+11+-+Session+Hijacking.pdfModule 12: Evading IDS, Firewalls, and Honeypotshttp://www.mediafire.com/file/rk987k4cjdjh3dg/CEH+v10+Module+12+-+Evading+IDS%2C+Firewall+and+Honeypots+Technology+Brief.pdfModule 13: Hacking Web Servershttp://www.mediafire.com/file/qg64tphpvb01a9n/CEH+v10+Module+13+Hacking+Web+Servers.pdfModule 14: Hacking Web Applicationshttp://www.mediafire.com/file/jsw9uoynzn3bsbd/CEH+v10+Module+14+-+Hacking+Web+Applications.pdfModule 15: SQL Injectionhttp://www.mediafire.com/file/c7l2aadg1y7kmwt/CEModule 16: Hacking Wireless Networkshttp://www.mediafire.com/file/edcootq6rdwcg55/CEH+v10+Module+16+-+Hacking+Wireless+Networks.pdfModule 17: Hacking Mobile Platformshttp://www.mediafire.com/file/as24k9534hjkc43/CEH+v10+Module+17+-Hacking+Mobile+Platforms.pdf
More detailsPublished - Wed, 12 Apr 2023
Created by - Mary Smith
Cyber Security Courses: https://mega.nz/folder/QtUBkSyI#pWhNWowJhOTamWY0PuODLA
More detailsPublished - Fri, 28 Apr 2023
Created by - Mary Smith
https://mega.nz/folder/1rBHzIyD#M-aTi-c1nC3OGNgpH8OqhA
More detailsPublished - Wed, 17 May 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review