PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

which two ways can NPIV be used in your proposed design?

Youare the SAN designer for the ABC Company. Due to budget constraints, there is increased
pressure by management to further optimize server utilization by implementing virtualization
technologies on all servers and increase virtual machines density. Faced with some SAN
challenges, the server team requests your help in the design and implementation of the SAN in
the new virtualized environment.
In which two ways can NPIV be used in your proposed design? (Choose two.)

What is the best method to decrease duty cycle (radio f…

You are designing a wireless LAN with the following components:
 High-density indoor access point deployment
 2.4-GHz and 5-GHz radios
 802.11a, 802.11g, and 802.11n mode wireless LAN clients
Site survey results show negligible foreign WiFi and non-WiFi interference. What is the best
method to decrease duty cycle (radio frequency utilization) and increase overall wireless LAN
client performance for this design?

Which solution meets these requirements?

A company has these requirements for access to their wireless and wired corporate LANs using
802.1x:
 Client devices that are corporate assets and have been joined to
the Active Directory domain are allowed access.
 Personal devices must not be allowed access. Clients and access servers must be mutually authenticated.
Which solution meets these requirements?

which switch security option should you investigate to …

You have been hired by Acme Corporation to evaluate their existing network and determine if
the current network design is secure enough to prevent man-in-the-middle attacks. When
evaluating the network, which switch security option should you investigate to ensure that
authorized ARP responses take place according to known IP-to-MAC address mapping?

Which technology would you recommend to enhance securit…

Youare a network designer and have been asked to consult with your server operations team
to further enhance the security of the network. The operations team provides you with these
details about the network:
 A pool of servers is accessed by numerous data centers and
remote sites. The servers are accessed via a cluster of firewalls.
 The firewalls are configured properly and are not dropping traffic.
 The firewalls occasionally cause asymmetric routing of traffic
within the server data center.
Which technology would you recommend to enhance security by limiting traffic that could
originate from a hacker compromising a workstation and redirecting flows at the servers?


Page 413 of 4,656« First...102030...411412413414415...420430440...Last »