Tag Archives: reports

A customer reports that Host-1 is failing to receive streaming traffic from the IPTV source. The engineer has confirmed that hosts on router R2 are receiving traffic normally and that Host-1 is correctly sending subscription messages to join the IPTV stream. Which action must the engineer take to correct the problem?

Refer to the exhibit. A customer reports that Host-1 is failing to receive streaming traffic from the IPTV source. The engineer has confirmed that hosts on router R2 are receiving traffic normally and that Host-1 is correctly sending subscription messages to join the IPTV stream. Which action must the engineer take to correct the problem? A. Remove IP… Read More »

A Partner Is Looking For A Way To Keep Track Of User-Uploaded Videos That Match Content They Own. When Using Downloadable Reports, What Field Might Be Helpful When Linking Multiple Reports To Build Connections?

A Partner Is Looking For A Way To Keep Track Of User-Uploaded Videos That Match Content They Own. When Using Downloadable Reports, What Field Might Be Helpful When Linking Multiple Reports To Build Connections? Claim Origin Content Type Owner Policy Asset ID

Users cannot access a webserver and after the traffic is captured, the capture tool shows an ICMP packet that reports “communication administratively prohibited”. What is the cause of this webserver access issue?

A. An access list along the path is blocking the traffic. B. Users must authenticate on the webserver to access it. C. A router along the path is overloaded and thus dropping traffic. D. The traffic is not allowed to be translated with NAT and dropped. Answer: Option A. Explanation:  No answer description available for this question. Show… Read More »

Users cannot access a webserver and after the traffic is captured, the capture tool shows an ICMP packet that reports “time exceeded in-transit”. What is the cause of this webserver access issue?

A. A router along the path has the wrong time. B. A router along the path is misrouting the packets in a wrong direction. C. The server is too loaded and the connection could not be handled in time. D. The server is too far away and the packets require too much time to reach it. Answer: Option… Read More »

An email user has been lured into clicking a link in an email sent by their company’s security organization. The webpage that opens reports that it was safe, but the link may have contained malicious code. Which type of security program is in place?

A. user awareness B. brute force attack C. physical access control D. social engineering attack Answer: Option A. Explanation:  Section: Security Fundamentals This is a training program which simulates an attack, not a real attack (as it says “The webpage that opens reports that it was safe”) so we believed it should be called a “user awareness” program.… Read More »