Tag Archives: Protection

Which two are true about Oracle recovery and data protection solutions? (Choose two.)

Which two are true about Oracle recovery and data protection solutions? (Choose two.) A. Oracle Data Guard can prevent data loss caused by a site failure. B. Data Recovery Advisor can be used to validate backup strategies. C. RMAN can be used to roll back committed transactions. D. Data Recovery Advisor can be used to restore a single… Read More »

Router 1 and router 2 are running OSPF Area 0. The router logs on both routers show that the LDP link has flapped. Which configuration must the engineer apply to the two routers to implement session protection on the link?

Refer to the exhibit. Router 1 and router 2 are running OSPF Area 0. The router logs on both routers show that the LDP link has flapped. Which configuration must the engineer apply to the two routers to implement session protection on the link? A. Router 1(config)# ip cef distributed Router 1(config)# mpls ldp session protection global Router… Read More »

The network team must implement MPLS LDP session protection with two requirements: * Session protection is provided for core loopback IP addresses only. * The LDP session must remain operational for one hour when the WAN link on PE-XR1 fails. Which configuration must the team implement on PE-XR1?

Refer to the exhibit. The network team must implement MPLS LDP session protection with two requirements: * Session protection is provided for core loopback IP addresses only. * The LDP session must remain operational for one hour when the WAN link on PE-XR1 fails. Which configuration must the team implement on PE-XR1? A. configure terminal ipv4 access-list LDP-SESSION-PROTECTION… Read More »

An engineer must implement intrusion protection on the WLAN. The AP coverage is adequate and on-channel attacks are the primary concern. The building is historic, which makes adding APs difficult. Which AP mode and submode must be implemented?

A. AP mode: local, AP submode: none B. AP mode: monitor, AP submode: WIPS C. AP mode: monitor, AP submode: none D. AP mode: local, AP submode: WIPS Answer: Option D. Explanation:  No answer description available for this question. Show AnswerDiscussion The post An engineer must implement intrusion protection on the WLAN. The AP coverage is adequate and… Read More »

A global organization with several branches hired a network architect to design an overlay VPN solution. The branches communicate with each other frequently. The customer expects to add more branches in the future. To meet the customer’s security requirements, the architect plans to provide traffic protection using dynamic IPsec tunnels. Which solution should the architect choose?

A. DMVPN B. EasyVPN C. L2TP D. GETVPN Answer: Option A. Explanation:  No answer description available for this question. Show AnswerDiscussion The post A global organization with several branches hired a network architect to design an overlay VPN solution. The branches communicate with each other frequently.<br> The customer expects to add more branches in the future. To meet… Read More »

An engineer must check the admin rights of users on a database regularly and prepares the Python script to automate the process. The script connects to the database and runs a query. What is a security issue about the secrets in the code that relates to secret protection?

Refer to the exhibit. An engineer must check the admin rights of users on a database regularly and prepares the Python script to automate the process. The script connects to the database and runs a query. What is a security issue about the secrets in the code that relates to secret protection? A. They must be stored in… Read More »