Exam page:   1     2     3     4     5     6     7  

GIAC - Certified Forensic Analyst - GCFA exam dumps
You work as a Network Administrator for NetTech Inc. The company has a network that consists of 200 client computers and ten database servers. One morning, you find that an unauthorized user is accessing data on a database server on the network. Which of the following actions will you take to preserve the evidences?
Each correct answer represents a complete solution. Choose three.

A. Prevent the company employees from entering the server room.
B. Detach the network cable from the database server.
C. Prevent a forensics experts team from entering the server room.
D. Preserve the log files for a forensics expert.
  Access to the full exam of GCFA with correct answers  


GIAC - Certified Incident Handler - GCIH exam dumps
When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?
A. Filtered
B. Open
C. Closed
  Access to the full exam of GCIH with correct answers  


GIAC - Certified Penetration Tester - GPEN exam dumps
You want to connect to your friend's computer and run a Trojan on it. Which of the following tools will you use to accomplish the task?

A. PSExec
B. Hk.exe
C. Remoxec
D. GetAdmin.exe

  Access to the full exam of GPEN with correct answers  


GIAC - Certified Project Manager Certification - GCPM exam dumps
Which of the following is built by aggregating the costs of the individual work elements and then joining them at time intervals where meaningful actual cost information will be available?

A. Cost baseline
B. Cost estimation
C. Cost controlling
D. Cost budgeting
  Access to the full exam of GCPM with correct answers  


GIAC - GIAC Security Essentials - GSEC exam dumps
Which of the following should be implemented to protect an organization from spam?

A. Auditing
B. System hardening
C. E-mail filtering
D. Packet filtering
  Access to the full exam of GSEC with correct answers  


GIAC - Information Security Professional - GISP exam dumps
Which of the following terms describes an attempt to transfer DNS zone data?

A. Reconnaissance
B. Dumpster diving
C. Encapsulation
D. Spam
  Access to the full exam of GISP with correct answers  


GIAC - Python Coder - GPYC exam dumps

Which regular expression will match all date-time stamps for log files of the format shown in the screen capture?

A.

B.

C.

D.

  Access to the full exam of GPYC with correct answers  


GIAC - Security Leadership Certification - GSLC exam dumps
Which of the following generates MD5 hashes to check the MD5 value for each file processed and compares it with other MD5 strings?
A. Chaos MD5
B. Mat-MD5
C. md5sum command
D. MD5 Checksum Verifier
  Access to the full exam of GSLC with correct answers  


GIAC - Systems and Network Auditor - GSNA exam dumps
Which of the following tools is used to make fake authentication certificates?

A. Obiwan
B. Netcat
C. WinSSLMiM
D. Brutus
  Access to the full exam of GSNA with correct answers  


Google - Associate Android Developer - Associate Android Developer exam dumps

A company is running a publicly accessible serverless application that uses Amazon API Gateway and AWS Lambda. The application's traffic recently spiked due to fraudulent requests from botnets.

Which steps should a solutions architect take to block requests from unauthorized users? (Choose two.)

A. Create a usage plan with an API key that is shared with genuine users only.

B. Integrate logic within the Lambda function to ignore the requests from fraudulent IP addresses.

C. Implement an AWS WAF rule to target malicious requests and trigger actions to filter them out.

D. Convert the existing public API to a private API. Update the DNS records to redirect users to the new API endpoint.

E. Create an IAM role for each user attempting to access the API. A user will assume the role when making the API call.

  Access to the full exam of Associate Android Developer with correct answers  


Google - Associate Cloud Engineer - Associate Cloud Engineer exam dumps

Your managed instance group raised an alert stating that new instance creation has failed to create new instances. You need to maintain the number of running instances specified by the template to be able to process expected application traffic. What should you do?

A. Create an instance template that contains valid syntax which will be used by the instance group. Delete any persistent disks with the same name as instance names.

B. Create an instance template that contains valid syntax that will be used by the instance group. Verify that the instance name and persistent disk name values are not the same in the template.

C. Verify that the instance template being used by the instance group contains valid syntax. Delete any persistent disks with the same name as instance names. Set the disks.autoDelete property to true in the instance template.

D. Delete the current instance template and replace it with a new instance template. Verify that the instance name and persistent disk name values are not the same in the template. Set the disks.autoDelete property to true in the instance template.

  Access to the full exam of Associate Cloud Engineer with correct answers  


Google - Professional Cloud Developer - Professional Cloud Developer exam dumps

You need to upload files from your on-premises environment to Cloud Storage. You want the files to be encrypted on Cloud Storage using customer-supplied encryption keys. What should you do?

A. Supply the encryption key in a .boto configuration file. Use gsutil to upload the files.

B. Supply the encryption key using gcloud config. Use gsutil to upload the files to that bucket.

C. Use gsutil to upload the files, and use the flag --encryption-key to supply the encryption key.

D. Use gsutil to create a bucket, and use the flag --encryption-key to supply the encryption key. Use gsutil to upload the files to that bucket.

  Access to the full exam of Professional Cloud Developer with correct answers  


Google - Professional Cloud DevOps Engineer - Professional Cloud DevOps Engineer exam dumps

Your team uses Cloud Build for all CI/CD pipelines. You want to use the kubectl builder for Cloud Build to deploy new images to Google Kubernetes Engine (GKE). You need to authenticate to GKE while minimizing development effort. What should you do?

A. Assign the Container Developer role to the Cloud Build service account.

B. Specify the Container Developer role for Cloud Build in the cloudbuild.yaml file.

C. Create a new service account with the Container Developer role and use it to run Cloud Build.

D. Create a separate step in Cloud Build to retrieve service account credentials and pass these to kubectl.

  Access to the full exam of Professional Cloud DevOps Engineer with correct answers  


Google - Professional Cloud Network Engineer - Professional Cloud Network Engineer exam dumps

Your company offers a popular gaming service. Your instances are deployed with private IP addresses, and external access is granted through a global load balancer. You have recently engaged a traffic-scrubbing service and want to restrict your origin to allow connections only from the traffic-scrubbing service.

What should you do?

A. Create a Cloud Armor Security Policy that blocks all traffic except for the traffic-scrubbing service.

B. Create a VPC Firewall rule that blocks all traffic except for the traffic-scrubbing service.

C. Create a VPC Service Controls Perimeter that blocks all traffic except for the traffic-scrubbing service.

D. Create IPTables firewall rules that block all traffic except for the traffic-scrubbing service.

  Access to the full exam of Professional Cloud Network Engineer with correct answers  


Google - Professional Cloud Security Engineer - Professional Cloud Security Engineer exam dumps

A manager wants to start retaining security event logs for 2 years while minimizing costs. You write a filter to select the appropriate log entries.

Where should you export the logs?

A. BigQuery datasets

B. Cloud Storage buckets

C. StackDriver logging

D. Cloud Pub/Sub topics

  Access to the full exam of Professional Cloud Security Engineer with correct answers  


Google - Professional Data Engineer - Professional Data Engineer exam dumps

You are designing a data processing pipeline. The pipeline must be able to scale automatically as load increases. Messages must be processed at least once and must be ordered within windows of 1 hour. How should you design the solution?

A. Use Apache Kafka for message ingestion and use Cloud Dataproc for streaming analysis.

B. Use Apache Kafka for message ingestion and use Cloud Dataflow for streaming analysis.

C. Use Cloud Pub/Sub for message ingestion and Cloud Dataproc for streaming analysis.

D. Use Cloud Pub/Sub for message ingestion and Cloud Dataflow for streaming analysis.

  Access to the full exam of Professional Data Engineer with correct answers  


HCNA - HCIA-Routing & Switching - H12-211 exam dumps
Refer to the graphic. An administrator has configed RIPv2 in the two routers shows in the figure. What will happen after configuring the following commands? (Choose two)
[RTA-Serial0/0/1]rip output
[RTA-rip-1]silent-interface s0/0/1
A. RTA will have the route learned from the RTB
B. RTB will have the route learn from the RTA
C. RTA will have no neighbor relationship with RTB
D. RTB will have no neighbor relationship with RTB
  Access to the full exam of H12-211 with correct answers  


HCNA - HCIA-SDN - H31-611 exam dumps

In BGP, which of the following are methods for loop avoidance?

A. The Origin attribute of a route records the source from which the route was imported

B. In a route’s AS-Path attribute, all ASs along the path are recorded.

C. In the next-hop attribute of a route, the route’s next hop is recorded.

D. The MED attribute of a route affects the outbound interface selection of another AS.

  Access to the full exam of H31-611 with correct answers  


HCNA - HCIA-Security - H12-711 exam dumps

Which of the following are the status information that can be backed up by the HRP (Huawei Redundancy Protocol)protocol? (Multiple choice)

A. Session table

B. ServerMap entry

C. Dynamic blacklist

D. Routing table

  Access to the full exam of H12-711 with correct answers  


HCNA - HCIA-Video Conference - H11-851 exam dumps
The resolution of DVD is ( )
A. 720*576
B. 176*144
C. 704*576
D. 720*480
  Access to the full exam of H11-851 with correct answers  


HCNA - HCIA-WLAN - H12-311 exam dumps

In the thin AP networking, which of the following authentication methods does not require AC participation during the authentication process.

A. Shared key authentication B. 802.1X authentication

C. PSK authentication

D. Portal authentication

  Access to the full exam of H12-311 with correct answers  


HCNA - HCIE-Routing & Switching (Written) - H12-261 exam dumps

As shown in the following figure, R1 and R2 establish an EBGP peer relationship and the BFD function is enabled. Given this information, which of the following statements is true?

A. The time taken to detect BFD packets on R1 is 660 ms.

B. The time taken to detect BFD packets on R2 is 800 ms.

C. The time taken to detect BFD packets on R2 is 600 ms.

D. The time taken to detect BFD packets on R1 is 1280 ms.

  Access to the full exam of H12-261 with correct answers  


HCNA - HCIP-Routing & Switching-IERS - H12-221 exam dumps

Which type of BGP route can be added to the BGP routing table?

A. All BGP routes learned from peers

B. Only the routes learned from IBGP peers

C. Only the routes learned from EBGP peers

D. Only optimal routes

  Access to the full exam of H12-221 with correct answers  


HCNA - HCIP-Security-CISN - H12-721 exam dumps
A network is shown below.
A dial customer cannot establish a connection via a VPN client PC and USG (LNS) l2tp vpn. What are valid reasons for this failure? (Choose three answers)

A. LNS tunnel tunnel name change is inconsistent with the client name.
B. L2TP tunnel authentication failed.
C. PPP authentication fails, PPP authentication mode set on the client PC and LNS inconsistent.
D. Client PC can not obtain an IP address assigned to it from the LNS.
  Access to the full exam of H12-721 with correct answers  


HFMA - HFMA's Certified Healthcare Financial Professional - CHFP exam dumps
Supplies refer to small-dollar items that will be used up or fully consumed within more than two years.
A. True
B. False
  Access to the full exam of CHFP with correct answers  


HP - Aruba Certified ClearPass Associate Exam - HPE6-A82 exam dumps

Which is true regarding the Cisco Device Sensor feature in ClearPass? (Choose two.)

A. Forwards DHCP and HTTP user-agent info to ClearPass using Control and Datagram Transport Layer Security (DTLS) encapsulation.

B. Requires the purchase of a supported Cisco Access Point licensed as an Aruba Monitor Mode AP, to then act as the sensor.

C. Forwards DHCP and HTTP user-agent info to ClearPass using RADIUS accounting packets.

D. Gathers raw endpoint data from Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP).

E. Requires a Cisco Smart Net license to be installed on the Network Access Device (NAD) utilizing the feature.

  Access to the full exam of HPE6-A82 with correct answers  


HP - Aruba Certified ClearPass Professional Exam - HPE6-A68 exam dumps

An Android device goes through the single-SSID Onboarding process and successfully connects using EAP-TLS to the secure network.

What is the order in which services are triggered?

A. Onboard Provisioning, Onboard Authorization, Onboard Pre-Auth

B. Onboard Authorization, Onboard Provisioning, Onboard Authorization

C. Onboard Provisioning, Onboard Pre-Auth, Onboard Authorization

D. Onboard Provisioning, Onboard Authorization, Onboard Provisioning

E. Onboard Provisioning, Onboard Pre-Auth, Onboard Authorization, Onboard Provisioning

  Access to the full exam of HPE6-A68 with correct answers  


HP - Aruba Certified Design Professional Exam - HPE6-A47 exam dumps

A customer has a small office building that needs approximately 32 APs. The solution must support basic rogue AP detection and provide a stateful firewall with role-based policies. The customer would like the simplest, most cost-effective deployment that meets their needs.

What should the architect recommend?

A. Aruba remote APs

B. Aruba campus APs and a Virtual Mobility Controller

C. Aruba Instant APs

D. Aruba campus APs and an Aruba 7005 Mobility Controller

  Access to the full exam of HPE6-A47 with correct answers  


HP - Aruba Certified Mobility Associate Exam - HPE6-A70 exam dumps

A company currently uses Instant APs (IAPs), all managed by a virtual controller. The company expects to double in size within the next 18 months. The network manager wants to purchase additional APs to service the increased traffic load. The network manager also wants to deploy a Mobility Controller (MC) to manage all APs.

How should the network administrator adapt the current IAPs to a controlled architecture?

A. Configure the IAPS to establish CPSec tunnels to the new MCs.

B. Configure the IAPS to Campus APs, controlled by the new MCs.

C. Manage both the MCs and IAP clusters with Aruba Central.

D. Manage both the MCs and IAP clusters with a Mobility Master (MM).

  Access to the full exam of HPE6-A70 with correct answers  


HP - Aruba Certified Mobility Professional Exam - HPE6-A71 exam dumps

An administrator implements blacklisting of users that fail authentication functions three or more times. By default, how long will these users have to wait before they can successfully log into the network again?

A. 15 minutes

B. 1 hour

C. 4 hours

D. 24 hours

  Access to the full exam of HPE6-A71 with correct answers  


HP - Aruba Certified Switching Associate Exam - HPE6-A72 exam dumps

Which two options are correct regarding the IEEE 802.11ax standard? (Choose two.)

A. allows transmissions of up to 4.8Gbps

B. is an emerging satellite connection standard to allow wireless access anywhere in the world

C. operates only in the 5GHz similar to 802.11ac

D. operates in both the 2.4GHz and 5GHz radios bands

E. is the first WLAN standard to no longer use electromagnetic signals to transmit data

  Access to the full exam of HPE6-A72 with correct answers  


HP - Aruba Certified Switching Professional Exam - HPE6-A73 exam dumps

What are best practices when implementing VSX on AOS-CX switches? (Choose two.)

A. The ISL lag should use the default MTU size.

B. Timers should be left at their default values.

C. The default system MAC addresses should be used.

D. The keepalive connection should use a direct layer-3 connection.

E. The ISL lag should use at least 10GbE links or faster.

  Access to the full exam of HPE6-A73 with correct answers  


HP - Building HPE Hybrid IT Solutions - HPE0-V14 exam dumps

Which factors are used to determine RAM configuration maximum memory capacity? (Choose two.)

A. number and model of qualified processors

B. largest DIMM capacity qualified on the server

C. speed of the DIMMs being used

D. number of cores in the processor

E. number of PCIe slots

  Access to the full exam of HPE0-V14 with correct answers  


HP - Configuring HPE GreenLake Solutions - HPE0-P26 exam dumps

Is an HPE partner responsible for completing this task in the HPE GreenLake sales process?

Solution: Ensure customer agreement to a multi-year term of at least three years for the HPE GreenLake services.

A. Yes

B. No

  Access to the full exam of HPE0-P26 with correct answers  


HP - Designing HPE Hybrid IT Solutions - HPE0-S57 exam dumps

You are validating virtual machine sizing data for an infrastructure upgrade to SimpliVity.

Which tool can be used to collect and report the needed information?

A. Storage Sizer Tool

B. Lanamark Data Gathering tool

C. Infosight

D. SimpliVity Sizer Tool

  Access to the full exam of HPE0-S57 with correct answers  


HP - Designing HPE Nimble Solutions - HPE2-K42 exam dumps

A tebibyte (TiB) is compressed of how many gigabytes (GB)?

A. 900

B. 1000

C. 1024

D. 976, 565

  Access to the full exam of HPE2-K42 with correct answers  


HP - Designing HPE Server Solutions - HPE0-S54 exam dumps

A customer is expanding their blade based infrastructure with HPE Synergy platform. The customer is familiar with HPE Virtual Connect Manager and wants to know if the same management procedures can be used to manage HPE Synergy platform.

How should you answer the customer’s concern?

A. HPE Synergy can be managed by HPE Composer, which is running an embedded version of the HPE OneView.

B. HPE Synergy must be managed with HPE Systems Insight Manager

C. HPE Synergy supports Virtual Connect modules, so it can be managed using Virtual Connect Manager

D. HPE Synergy can be managed using Virtual Connect Manager as long as an additional license is purchased

  Access to the full exam of HPE0-S54 with correct answers  


HP - Designing HPE Software-Defined Infrastructure Solutions - HPE0-V13 exam dumps

You are proposing HPE Synergy to support a VMware vSphere environment, in which clusters of ESXi hosts provide high availability for workloads such as a web farm, an inventory server, and a database.

Is this a recommended design principle for this use case?

Set the BIOS workload profile for compute modules that will be ESXi hosts to one of the virtualization profiles.

A. Yes

B. No

  Access to the full exam of HPE0-V13 with correct answers  


HP - Designing Multi-Site HPE Storage Solutions - HPE0-J58 exam dumps

Refer to the Exhibit.

A customer with an existing HPE Nimble installation sends you the output shown. The administrator who initially set up the replication has left the company.

They ask you what the current RPO level for their replication is. How should you respond?

A. They need to verify the RPO level from the host vc-ms-fileserver

B. They have an RPO of four minutes

C. They need to send a screenshot of the volumes tab

D. They have an RPO of two minutes

  Access to the full exam of HPE0-J58 with correct answers  


HP - Implementing HPE Composable Infrastructure Solutions - HPE0-S58 exam dumps

A Synergy integrator is creating a network that needs to be connected from the Virtual Connect SE 40Gb F8 module to a Fibre Channel (FC) Switch.

Which network type should the integrator select during the network creation task?

A. Ethernet

B. FC over iSCSI

C. FC over Ethernet

D. FC

  Access to the full exam of HPE0-S58 with correct answers  


HP - Using HPE OneView - HPE2-T36 exam dumps

Which option from the HPE OneView main menu provides the utilization data for a server?

A. Server Hardware

B. Data Centers

C. Settings

D. Power Delivery Devices

  Access to the full exam of HPE2-T36 with correct answers  


HRCI - Global Professional in Human Resources - GPHR exam dumps
You have decided to outsource the moving service for all expatriate assignments. After an individual is chosen and has accepted an international assignment, you provide all necessary contact information to both parties with specific deadlines. Which of the following steps is the next step in managing the vendor ?

A. Monitoring operations for continual improvement
B. Specifying objectives to the vendor
C. Ensuring regular communication and reporting between parties
D. Periodic management reports
  Access to the full exam of GPHR with correct answers  


HRCI - Professional in Human Resources - PHR exam dumps
As an
H. Professional you must be familiar with several acts of congress, laws, and regulations that address risks in the workplace. Which of the following laws was the first to establish consistent safety standards for workers?

A. Mine Safety and Health Act
B. USA Patriot Act
C. Occupational Safety and Health Act
D. Homeland Security Act
  Access to the full exam of PHR with correct answers  


HRCI - Senior Professional in Human Resources - SPHR exam dumps
Jennifer wants to form a corporation that will develop software. As she studies the pros and cons of a corporation entity, she learns that there are four distinct characteristics of a corporation. Which of the following is NOT a characteristic of a corporation?
A. Liability is limited to the assets of the corporation.
B. Life of the corporation can extend beyond the life of the founder.
C. There is not a central management structure.
D. Ownership of the corporation can be transferred by selling stock.
  Access to the full exam of SPHR with correct answers  


IAPP - Certified Information Privacy Manager - CIPM exam dumps

Which of the following best supports implementing controls to bring privacy policies into effect?

A. The internal audit department establishing the audit controls which test for policy effectiveness.

B. The legal department or outside counsel conducting a thorough review of the privacy program and policies.

C. The Chief Information Officer as part of the Senior Management Team creating enterprise privacy policies to ensure controls are available.

D. The information technology (IT) group supporting and enhancing the privacy program and privacy policy by developing processes and controls.

  Access to the full exam of CIPM with correct answers  


IAPP - PRIVACY IN TECHNOLOGY CERTIFICATION - CIPT exam dumps

Which of the following is NOT relevant to a user exercising their data portability rights?

A. Notice and consent for the downloading of data.

B. Detection of phishing attacks against the portability interface.

C. Re-authentication of an account, including two-factor authentication as appropriate.

D. Validation of users with unauthenticated identifiers (e.g. IP address, physical address).

  Access to the full exam of CIPT with correct answers  


IASSC - Black Belt Certification - ICBB exam dumps
A Belt working in a supply chain environment has to make a decision to change suppliers of critical raw materials for a new product upgrade. The purchasing manager is depending on the Belt's effort requiring that the average cost of an internal critical raw material component be less than or equal to $4,200 in order to stay within budget. Using a sample of 35 first article components, a Mean of the new product upgrade price of $4,060, and a Standard Deviation of $98 was estimated. The Alternative Hypothesis in the above example is?
A. The Standard Deviation is equal to $300.
B. The Mean is less than $4,320.
C. The Mean is equal to $4,060.
D. The Mean is less than $4,200.
E. The Mean is greater than $ 4,200.
  Access to the full exam of ICBB with correct answers  


IASSC - Green Belt Certification - ICGB exam dumps
Having an Alpha of .05 and a Beta of .10 are the most common risk levels when running a Statistical test.
A. True
B. False
  Access to the full exam of ICGB with correct answers  


IASSC - Yellow Belt Certification - ICYB exam dumps
The "Equipment" category of Root Causes on a Fishbone Diagram would be used primarily used to generate ideas as to which of the following are possible causes for defects?
A. Out of calibration measurement system
B. Tolerance changes in milling machines
C. Worn bearings on a shaft
D. All of these answers are correct
  Access to the full exam of ICYB with correct answers  


IBM - Fundamentals of IBM TRIRIGA Application Platform V3.2.1 Application Development - C2010-653 exam dumps
When creating an editable query, how many forms can be included in the query?
A. 0
B. 1
C. 2
D. unlimited
  Access to the full exam of C2010-653 with correct answers  




Question page:   1     2     3     4     5     6     7     8     9     10   ...