Exam page:   1     2     3     4     5     6     7  

Microsoft - Analyzing Data with Microsoft Power BI - DA-100 exam dumps

You have a workspace that contains a dashboard named Sales Data. The Sales Data dashboard displays data from two datasets. Users complain that natural language queries on the dashboard often returns on results. You want users to be able find data by using natural language queries. You open the properties of the datasets and modify the Q&A and Cortana settings.

Does this action allow users to find data by using natural language queries?

A. Yes, it does

B. No, it does not

  Access to the full exam of DA-100 with correct answers  


ABA - Certified Trust and Fiduciary Advisor - CTFA exam dumps

Which of the following statement is not characteristic of a line chart?

A. It is simplest and most familiar chart

B. It is efficient in showing more detail

C. It is an extension of a scatter graph

D. It is created by connecting a series of points

  Access to the full exam of CTFA with correct answers  


ACAMS - CAMS — Certified Anti-Money Laundering Specialis - CAMS exam dumps
In which three situations is correspondent banking most vulnerable to money laundering? Choose 3 answers
A. When allowing foreign banks to use the correspondent account to conduct large financial transactions on behalf of their customers
B. When allowing the correspondent bank account to be used as a payable through account (PTA)
C. When allowing the correspondent bank account to be used by other banks
D. When allowing financial institutions, without proper due diligence, to access correspondent network for routing their financial transactions
  Access to the full exam of CAMS with correct answers  


ACFE - Certified Fraud Examiners - CFE exam dumps

Fraudsters use the accounting system as a tool to generate the results they want in ___________ approach:

A. Organized accounting

B. Playing the accounting

C. beating accounting

D. All of the above

  Access to the full exam of CFE with correct answers  


Adobe - Adobe Certified Expert - Adobe Experience Manager Forms Developer - 9A0-410 exam dumps

In designer, which workflow allows a textfield to expand and span multiple pages of a form template?

A. Select Allow Page Breaks within Content option and set the form content property

B. Select Allow Multiple Lines, Allow Page Breaks within Content options, and set the form content property

C. Select Allow Multiple Lines and Allow Page Breaks within Content options

D. Select Allow Span Lines option only and deselect Prevent Page Breaks

  Access to the full exam of 9A0-410 with correct answers  


AHIMA - Registered Health Information Administrator - RHIA exam dumps

A number of key elements for your facility's computerized patient record are still input by clerical staff from handwritten data entry sheets. You are concerned about the transfer of data. If the vital signs stored in the database are not what were originally recorded, the impact on patient care could be severe. You are concerned about the

A. stability of the data.

B. validity of the data.

C. legitimacy of the data.

D. reliability of the data.

  Access to the full exam of RHIA with correct answers  


AICPA - Certified Public Accountant (CPA) - CPA exam dumps
What happens when you attempt to compile and run the following code?
#include  
#include  
using namespace std;
class First
{
string *s;
public:
First() { s = new string("Text");}
~First() { delete s;}
void Print(){ cout<<*s;}
};
int main()
{
First FirstObject;
FirstObject.Print();
FirstObject.~First();
}
A. It prints: Text
B. Compilation error
C. Runtime error.
D. None of these
  Access to the full exam of CPA with correct answers  


Alfresco - Alfresco Process Services Certified Administrator (APSCA) - APSCA exam dumps

After restoring an activiti-app backup to a new server, errors are occurring with all of the processes that have stencils using scripts, what could be the issue?

A. The activiti-app is not able to access the restored elastic-search data directory.

B. The activiti-app does not have enough threads to connect to the database.

C. The Alfresco Process Services license was not deployed.

D. The activiti-app is not able to access the restored contentstorage data.

  Access to the full exam of APSCA with correct answers  


Amazon - AWS Certified Advanced Networking - Specialty - ANS-C00 exam dumps

In Amazon CloudFront, which of the following is true of Smooth Streaming?

A. It is a Microsoft format for streaming of media files.

B. It is a CloudFront format for streaming of media files in RTMP distribution.

C. It is the Adobe format for streaming of media files.

D. It is a CloudFront format for streaming of media files in web distribution.

  Access to the full exam of ANS-C00 with correct answers  


Amazon - AWS Certified Cloud Practitioner - CLF-C01 exam dumps

A user has an AWS Business Support plan and requires detailed billing information.

Which AWS resource will help?

A. AWS Concierge Support

B. AWS Service Catalog

C. AWS Budgets

D. AWS Cost and Usage Report

  Access to the full exam of CLF-C01 with correct answers  


Amazon - AWS Certified Data Analytics - Specialty - DAS-C01 exam dumps

A company needs to store objects containing log data in JSON format. The objects are generated by eight applications running in AWS. Six of the applications generate a total of 500 KiB of data per second, and two of the applications can generate up to 2 MiB of data per second.

A data engineer wants to implement a scalable solution to capture and store usage data in an Amazon S3 bucket. The usage data objects need to be reformatted, converted to .csv format, and then compressed before they are stored in Amazon S3. The company requires the solution to include the least custom code possible and has authorized the data engineer to request a service quota increase if needed.

Which solution meets these requirements?

A. Configure an Amazon Kinesis Data Firehose delivery stream for each application. Write AWS Lambda functions to read log data objects from the stream for each application. Have the function perform reformatting and .csv conversion. Enable compression on all the delivery streams.

B. Configure an Amazon Kinesis data stream with one shard per application. Write an AWS Lambda function to read usage data objects from the shards. Have the function perform .csv conversion, reformatting, and compression of the data. Have the function store the output in Amazon S3.

C. Configure an Amazon Kinesis data stream for each application. Write an AWS Lambda function to read usage data objects from the stream for each application. Have the function perform .csv conversion, reformatting, and compression of the data. Have the function store the output in Amazon S3.

D. Store usage data objects in an Amazon DynamoDB table. Configure a DynamoDB stream to copy the objects to an S3 bucket. Configure an AWS Lambda function to be triggered when objects are written to the S3 bucket. Have the function convert the objects into .csv format.

  Access to the full exam of DAS-C01 with correct answers  


Amazon - AWS Certified Database - Specialty - DBS-C01 exam dumps

A database specialist deployed an Amazon RDS DB instance in Dev-VPC1 used by their development team. Dev-VPC1 has a peering connection with Dev-VPC2 that belongs to a different development team in the same department. The networking team confirmed that the routing between VPCs is correct; however, the database engineers in Dev-VPC2 are getting a timeout connections error when trying to connect to the database in Dev-VPC1.

What is likely causing the timeouts?

A. The database is deployed in a VPC that is in a different Region.

B. The database is deployed in a VPC that is in a different Availability Zone.

C. The database is deployed with misconfigured security groups.

D. The database is deployed with the wrong client connect timeout configuration.

  Access to the full exam of DBS-C01 with correct answers  


Amazon - AWS Certified Developer - Associate - DVA-C01 exam dumps

A developer is designing a distributed application built using a microservices architecture spanning multiple AWS accounts. The company’s operations team wants to analyze and debug application issues from a centralized account.

How can the developer meet these requirements?

A. Use an Amazon X-Ray agent with role assumption to publish data into the centralized account.

B. Use Amazon X-Ray and create a new IAM user to publish the access keys into the centralized account.

C. Use VPC Flow Logs to collect applications logs across different accounts.

D. Enable AWS CloudTrail to publish the trails in an Amazon S3 bucket in the centralized account.

  Access to the full exam of DVA-C01 with correct answers  


Amazon - AWS Certified DevOps Engineer - Professional - DOP-C01 exam dumps

Ansible provides some methods for controlling how or when a task is ran. Which of the following is a valid method for controlling a task with a loop?

A. -with: <value>

B. -with_items: <value>

C. - only_when: <conditional>

D. -items: <value>

  Access to the full exam of DOP-C01 with correct answers  


Amazon - AWS Certified Machine Learning – Specialty - MLS-C01 exam dumps

A company uses camera images of the tops of items displayed on store shelves to determine which items were removed and which ones still remain. After several hours of data labeling, the company has a total of 1,000 hand-labeled images covering 10 distinct items. The training results were poor.

Which machine learning approach fulfills the company’s long-term needs?

A. Convert the images to grayscale and retrain the model

B. Reduce the number of distinct items from 10 to 2, build the model, and iterate

C. Attach different colored labels to each item, take the images again, and build the model

D. Augment training data for each item using image variants like inversions and translations, build the model, and iterate.

  Access to the full exam of MLS-C01 with correct answers  


Amazon - AWS Certified Security - Specialty - SCS-C01 exam dumps

A company is building an application on AWS that will store sensitive information. The company has a support team with access to the IT infrastructure, including databases. The company’s security engineer must introduce measures to protect the sensitive data against any data breach while minimizing management overhead. The credentials must be regularly rotated.

What should the security engineer recommend?

A. Enable Amazon RDS encryption to encrypt the database and snapshots. Enable Amazon Elastic Block Store (Amazon EBS) encryption on Amazon EC2 instances. Include the database credential in the EC2 user data field. Use an AWS Lambda function to rotate database credentials. Set up TLS for the connection to the database.

B. Install a database on an Amazon EC2 instance. Enable third-party disk encryption to encrypt Amazon Elastic Block Store (Amazon EBS) volume. Store the database credentials in AWS CloudHSM with automatic rotation. Set up TLS for the connection to the database.

C. Enable Amazon RDS encryption to encrypt the database and snapshots. Enable Amazon Elastic Block Store (Amazon EBS) encryption on Amazon EC2 instances. Store the database credentials in AWS Secrets Manager with automatic rotation. Set up TLS for the connection to the RDS hosted database.

D. Set up an AWS CloudHSM cluster with AWS Key Management Service (AWS KMS) to store KMS keys. Set up Amazon RDS encryption using AWS KSM to encrypt the database. Store the database credentials in AWS Systems Manager Parameter Store with automatic rotation. Set up TLS for the connection to the RDS hosted database.

  Access to the full exam of SCS-C01 with correct answers  


Amazon - AWS Certified Solutions Architect – Associate - SAA-C02 exam dumps

A company must generate sales reports at the beginning of every month. The reporting process launches 20 Amazon EC2 instances on the first of the month. The process runs for 7 days and cannot be interrupted. The company wants to minimize costs.

Which pricing model should the company choose?

A. Reserved Instances

B. Spot Block Instances

C. On-Demand Instances

D. Scheduled Reserved Instances

  Access to the full exam of SAA-C02 with correct answers  


Amazon - AWS Certified Solutions Architect - Professional - SAP-C01 exam dumps

A solutions architect is building a web application that uses an Amazon RDS for PostgreSQL DB instance. The DB instance is expected to receive many more reads than writes. The solutions architect needs to ensure that the large amount of read traffic can be accommodated and that the DB instance is highly available.

Which steps should the solutions architect take to meet these requirements? (Choose three.)

A. Create multiple read replicas and put them into an Auto Scaling group.

B. Create multiple read replicas in different Availability Zones.

C. Create an Amazon Route 53 hosted zone and a record set for each read replica with a TTL and a weighted routing policy.

D. Create an Application Load Balancer (ALB) and put the read replicas behind the ALB.

E. Configure an Amazon CloudWatch alarm to detect a failed read replicas. Set the alarm to directly invoke an AWS Lambda function to delete its Route 53 record set.

F. Configure an Amazon Route 53 health check for each read replica using its endpoint.

  Access to the full exam of SAP-C01 with correct answers  


Amazon - AWS Certified SysOps Administrator - Associate - SOA-C01 exam dumps

A company hosts its website on Amazon EC2 instances behind an Application Load Balancer. The company manages its DNS with Amazon Route 53, and wants to point its domain’s zone apex to

the website.

Which type of record should be used to meet these requirements?

A. An AAAA record for the domain’s zone apex

B. An A record for the domain’s zone apex

C. A CNAME record for the domain’s zone apex

D. An alias record for the domain’s zone apex

  Access to the full exam of SOA-C01 with correct answers  


APICS - Certified Supply Chain Professional - CSCP exam dumps

- (Topic 3) One of the first steps in devising an effective supply chain strategy within a company is to analyze a product's:

A. nature of demand.

B. backlog position.

C. forecast bias.

D. sales performance.

  Access to the full exam of CSCP with correct answers  


Apple - Apple Certified Mac Technician (ACMT) Mac OS X v10.6 Troubleshooting Exam - 9L0-062 exam dumps
A(n) ________ account user can create, delete, modify accounts, install software, and change system settings.
A. Guest
B. Standard
C. Sharing Only
D. Administrator
  Access to the full exam of 9L0-062 with correct answers  


Apple - Apple Certified Mac Technician (ACMT) Mac Service Certification Exam - 9L0-008 exam dumps
Which TWO of the following are symptoms of a 'no video' condition? SELECT TWO

A. You don't hear a startup chime.
B. You can't connect to the Internet.
C. You may hear fan or drive noise.
D. The power button or power indicator lights up.
E. The cursor is frozen and the system is unresponsive.
  Access to the full exam of 9L0-008 with correct answers  


ASQ - Quality Auditor Certification - CQA exam dumps
The most important item to check when auditing against a specification is the _________
A. list of documents within the specification
B. copy of the previous revision of the specification
C. document control procedure
D. revision level of the specification
  Access to the full exam of CQA with correct answers  


ASQ - Quality Engineer Certification - CQE exam dumps
When planning quality control functions, which one of the following is MOST directly related to production of a quality product?

A. Process control and process capability.
B. Suitable blueprints.
C. Dimensional tolerancing.
D. Product audits.
  Access to the full exam of CQE with correct answers  


Atlassian - Jira Project Administrator - ACP-600 exam dumps

The support team has a request.

When a Bug is created, it should only display five fields. However, when it is edited, it should display fourteen fields.

Which configuration is used to implement this requirement?

A. Issue Type Scheme

B. Workflow Scheme

C. Permission Scheme

D. Field Configuration Scheme

E. Screen Scheme

  Access to the full exam of ACP-600 with correct answers  


BACB - BOARD CERTIFIED ASSISTANT BEHAVIOR ANALYST - BCaBA exam dumps

Teaching a student a self-talk strategy consisting of, "After I use the toilet, I must flush." is an example oF.

A. contingency shaped behavio

B. direct instructio

C. imitative instructio

D. rule-governed behavio

  Access to the full exam of BCaBA with correct answers  


BACB - The Board Certified Behavior Analyst - BCBA exam dumps

The purpose of including untaught items or tasks within a Discrete Trial Instruction program is to assess:

A. context.

B. fluency.

C. generalization.

D. mastery.

  Access to the full exam of BCBA with correct answers  


BICSI - Registered Communications Distribution Designer - RCDD exam dumps

- (Topic 15) You are designing a paging system for a 588 sq m (6325 sq ft) open office space. Due to architectural features of the ceiling, wall mounted speakers must be used. Following the general rule about wall mounted speaker placement, how many speakers should be installed?

A. Eight

B. Ten

C. Twelve

D. Fourteen

  Access to the full exam of RCDD with correct answers  


Blackberry - BlackBerry Enterprise Test Environement - BCP-221 exam dumps
What does the Expired Message count indicate in the BlackBerry Administration Service? (Choose one.)

A. Email messages were purged from the BlackBerry device
B. The BlackBerry device user was out of a wireless coverage area or the BlackBerry device was turned off for 7 or more days
C. Pending email messages were purged on the BlackBerry Enterprise Server
D. Email messages were deleted by the system administrator
E. Message filters on the BlackBerry device blocked the email messages coming from the BlackBerry Enterprise Server
  Access to the full exam of BCP-221 with correct answers  


Blueprism - Certified blueprism Professional Developer - APD01 exam dumps

Which of the following statements regarding Blue Prism Login Agent are true? (Select all that apply.)

A. Windows passwords can be changed using Login Agent Functionality

B. It is not possible to use Login Agent to traverse the ‘Press CTRL + ALT + DELETE to log on’ screen

C. Blue Prism Login Agent can be used to lock a Resource PC

D. You cannot configure the Blue Prism scheduler to login via Login Agent and then run a business process once it has logged in

  Access to the full exam of APD01 with correct answers  


CA Technologies - Administration of Symantec Endpoint Protection 14 - 250-428 exam dumps

An administrator wants to have the SEPM run a batch file as the result of a notification.

What directory does a batch file need to be in for the batch file to run?

A. \Program Files\Symantec\Symantec Endpoint Protection Manager\tomcat

B. \Program Files\Symantec\Symantec Endpoint Protection Manager\data

C. \Program Files\Symantec\Symantec Endpoint Protection Manager\bin

D. \Program Files\Symantec\Symantec Endpoint Protection Manager\bin64

  Access to the full exam of 250-428 with correct answers  


CertNexus - Cybersec First Responder - CFR-310 exam dumps

An incident at a government agency has occurred and the following actions were taken:

-Users have regained access to email accounts

-Temporary VPN services have been removed

-Host-based intrusion prevention system (HIPS) and antivirus (AV) signatures have been updated

-Temporary email servers have been decommissioned

Which of the following phases of the incident response process match the actions taken?

A. Containment

B. Post-incident

C. Recovery

D. Identification

  Access to the full exam of CFR-310 with correct answers  


Cisco - Cisco Certified CyberOps Associate - 200-201 CBROPS exam dumps

What is the final step in the Cyber Kill Chain framework?

A. exploitation

B. command and control

C. action on objectives

D. installation

  Access to the full exam of 200-201 CBROPS with correct answers  


Cisco - Cisco Certified Network Associate - 200-301 CCNA itnv7 exam dumps

Which of the following splits the network into separate broadcast domains?

A. bridges

B. VLANs

C. switches

D. hubs

  Access to the full exam of 200-301 CCNA itnv7 with correct answers  


Cisco - Designing Cisco Enterprise Networks (ENSLD) - 300-420 ENSLD exam dumps

You have three switches connected as shown in the diagram below: S1, S2, and S3.

You instructed your assistant to configure the switches so that the following requirements would be met:

Switch 1 should be the root bridge for VLAN A VLAN C should forward over the Gig 1/0/1 link between Switch 2 and Switch 3 VLAN B should forward over the Gig 1/0/2 link between Switch 2 and Switch 3

However, after your assistant performs the configuration, you discover that: Switch 2 is the root bridge for VLAN A VLAN C is forwarding over the Gig 1/0/2 link between Switch 2 and Switch 3 VLAN B is forwarding over the Gig 1/0/1 link between Switch 2 and Switch 3

When you execute the show spanning tree command on Switch 2, you determine that all link costs and priorities are set at the defaults.

Which of the following actions performed on Switch 2 would enable the desired configuration? (Choose three. Each correct answer is part of one solution.)

A. switch2(config)# spanning-tree vlan a priority 61440

B. switch2(config)# spanning-tree vlan a priority 1

C. switch2(config)# int G1/0/2switch2(config-if)# spanning-tree vlan b cost 1

D. switch2(config)# int G1/0/2switch2(config-if)# spanning-tree vlan b cost 19

E. switch2(config)# int G1/0/1switch2(config-if)# spanning-tree vlan c port-priority 64

F. switch2(config)# int G1/0/1switch2(config-if)# spanning-tree vlan c port-priority 128

  Access to the full exam of 300-420 ENSLD with correct answers  


Cisco - Implementing and Operating Cisco Data Center Core Technologies (DCCOR) - 350-601 DCCOR exam dumps

Which of the following Cisco Unified Fabric features improves on data center security?

A. use of iSCSI instead of FCoE

B. deployment of consistent network policies

C. elimination of reliance on STP

D. convergence of network and storage

  Access to the full exam of 350-601 DCCOR with correct answers  


Cisco - Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) - 350-401 ENCOR exam dumps

You issue the show running-config command on a Cisco 3700 series router named RouterA and receive the following partial output:

Cisco 350-401 Exam

RouterA begins to receive VoIP and FTP packets.

Which of the following statements is correct? (Select the best answer.)

A. The VoIP packets will be sent before the FTP packets.

B. The FTP packets will be sent before the VoIP packets.

C. Smaller packets will be sent before larger packets.

D. Larger packets will be sent before smaller packets.

E. Packets will be sent in the order they are received.

  Access to the full exam of 350-401 ENCOR with correct answers  


Cisco - Implementing and Operating Cisco Security Core Technologies (SCOR) - 350-701 SCOR exam dumps

What is a characteristic of traffic storm control behavior?

A. Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level within the interval.

B. Traffic storm control cannot determine if the packet is unicast or broadcast.

C. Traffic storm control monitors incoming traffic levels over a 10-second traffic storm control interval.

D. Traffic storm control uses the Individual/Group bit in the packet source address to determine if the packet is unicast or broadcast.

  Access to the full exam of 350-701 SCOR with correct answers  


Cisco - Implementing Automation for Cisco Collaboration Solutions (CLAUI) - 300-835 exam dumps

A developer is working with general trace settings for individual CUCM services by using <updateProcessNodeService> request. Which element will the developer use to configure granular settings in CCM Admin server trace web UI?

A. updateProcessNodeService/userCategories

B. updateProcessNodeService/TraceFields

C. updateProcessNodeService/CUCMFields

D. updateProcessNodeService/traceCategories

  Access to the full exam of 300-835 with correct answers  


Cisco - Implementing Automation for Cisco Security Solutions (SAUI) - 300-735 SAUTO exam dumps

What is the effect of the samesecuritytraffic permit intrainterface command on a Cisco ASA? (Select the best answer.)

A. It allows communication between different interfaces that share the same security level.

B. It allows traffic to exit the same interface through which it entered.

C. It allows outbound traffic and the corresponding return traffic to pass through different ASAs.

D. It allows traffic destined to unprotected subnets to bypass a VPN tunnel.

  Access to the full exam of 300-735 SAUTO with correct answers  


Cisco - Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) - 300-410 ENARSI exam dumps

Examine the following output.

You are investigating why router RouterA does not include the 172.16.0.0 network in its BGP advertisements. The output contains portions of RouterA's configuration and IP routing table.

Which statement correctly identifies the reason why this subnet does not appear in the BGP advertisements?

A. BGP synchronization is enabled by default.

B. The no auto-summary command was used.

C. The 172.16.31.0/24 network was learned through BGP.

D. The 10.1.2.3 IP address was not defined as a BGP neighbor.

  Access to the full exam of 300-410 ENARSI with correct answers  


CIW - CIW E-Commerce Specialist Certifications exam - 1D0-525 exam dumps
The details of an e-commerce site order can be kept in memory, stored on the visitor's computer or stored on the Web server. This ability to remember the details of an order is known as:
A. profiling an order.
B. tracking an order.
C. persisting an order.
D. filling the shopping cart.
  Access to the full exam of 1D0-525 with correct answers  


CIW - CIW Internet Business Associate - 1D0-61A exam dumps
Which choice lists the required elements for HTTP to function?
A. Server, HTML and DNS
B. Client, server and TCP/IP
C. Browser, HTML and TCP/IP
D. Client, Web page and DNS
  Access to the full exam of 1D0-61A with correct answers  


CIW - CIW Network Technology Associate - 1D0-61C exam dumps
You want to restrict host access to a wireless access point. What is the best way to do this?
A. Enable MAC address filtering at each host.
B. Log in to the access point and configure features, such as changing the SSID.
C. Change the Direct Sequence Spread Spectrum (DSSS) signal at both the access point and each hosts NIC.
D. Install software on the host you want to limit, then use a Web browser to log in to the host and configure it with the necessary settings to use the access point.
  Access to the full exam of 1D0-61C with correct answers  


CIW - CIW Perl Specialist - 1D0-437 exam dumps
Which Perl debugger commands can be used to step through a script?

A. b and d
B. t and c
C. s and n
D. X and V
  Access to the full exam of 1D0-437 with correct answers  


CIW - CIW Web Design Specialist - 1D0-520 exam dumps
The JavaScript open() method that is used to create a pop-up/pop-under window belongs to what DOM object?
A. Body
B. Client
C. Window
D. Document
  Access to the full exam of 1D0-520 with correct answers  


CIW - CIW Web Foundations Associate certification exam - 1D0-610 exam dumps
To define a circle-shaped hot-spot for an image map, which of the following code fragments would you use?

A. Option A
B. Option B
C. Option C
D. Option D
  Access to the full exam of 1D0-610 with correct answers  


CIW - User Interface Designer - 1D0-621 exam dumps

When usability testing results are reported, what should that report include?

A. Test goals, test subject demographics, conclusions

B. Data collection process, original design mockups, wireframes

C. Test schedule, test subject name, screen shots

D. Test subject name, original design plan, release date

  Access to the full exam of 1D0-621 with correct answers  


CompTIA - CompTIA A+ - 220-1001 exam dumps

A customer wants to install a new computer in a room that does not have any network drops. The customer authorizes a technician to install a new network jack in the room. Which of the following tools should the technician use to finish installing the new network jack?

A. Multimeter

B. Loopback plug

C. Crimper

D. Punchdown tool

  Access to the full exam of 220-1001 with correct answers  


CompTIA - CompTIA CASP+ - CAS-003 exam dumps

You are a security analyst tasked with interpreting an Nmap scan output from Company A’s privileged network.

The company’s hardening guidelines indicate the following: There should be one primary server or service per device. Only default ports should be used. Non-secure protocols should be disabled.

INSTRUCTIONS

Using the Nmap output, identify the devices on the network and their roles, and any open ports that should be closed. For each device found, add a device entry to the Devices Discovered list, with the following information:

The IP address of the device The primary server or service of the device The protocol(s) that should be disabled based on the hardening guidelines

To select multiple protocols, use CTRL+CLICK.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

A. Mastered

B. Not Mastered

  Access to the full exam of CAS-003 with correct answers  




Question page:   1   ...   7     8     9     10     11     12     13     14     15     16     17   ...