Tag Archives: secure

Given: (Exhibit) What will secure this code from a potential Denial of Service condition?

Given:What will secure this code from a potential Denial of Service condition? A. After Line 4, add indexReader.close(). B. On Line 1, use try with resources when opening each dataReader. C. After Line 3, add dataReader.close(). D. On Line 3, enclose processData(dataReader) with try with resources. E. Before Line 1, check the size of dataFiles to make sure… Read More »

Given: (Exhibit) What will secure this code from a potential Denial of Service condition?

Given:What will secure this code from a potential Denial of Service condition? A. After Line 3, add dataReader.close(). B. On Line 1, use try with resources when opening each dataReader. C. After Line 4, add indexReader.close(). D. Before Line 1, check the size of dataFiles to make sure it does not exceed a threshold. E. On Line 3,… Read More »

Which authentication mechanisms can be used to secure your service In Of arte Application Container Cloud

Which authentication mechanisms can be used to secure your service In Of arte Application Container Cloud Service using Oracle Identity Cloud Service?Response: A. Form based B. Bosk and OAuth C. OAuth D. Digest Correct Answer: C

An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol. Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)

Refer to the exhibit. An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol. Which two actions must the engineer implement to complete the SSH configuration? (Choose two.) A. Configure an IP domain name. B. Configure service password encryption. C.… Read More »

Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?

A. SSL B. Cisco TrustSec C. MACsec D. IPsec Answer: Option C. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model? appeared first on Majanto.

Which two mechanisms are available to secure NTP? (Choose two.)

A. IPsec B. IP prefix list-based C. encrypted authentication D. TACACS-based authentication E. IP access list-based Answer: Option C, E. Explanation:  Reference: https://www.cisco.com/c/dam/en/us/td/docs/ios-xml/ios/bsm/configuration/xe-3se/3650/bsm-xe-3se-3650-book.html Show AnswerDiscussion The post Which two mechanisms are available to secure NTP? (Choose two.) appeared first on Majanto.

Which algorithms are used to secure REST API from brute attacks and minimize the impact?

A. SHA-512 and SHA-384 B. MD5 algorithm-128 and SHA-384 C. SHA-1, SHA-256, and SHA-512 D. PBKDF2, BCrypt, and SCrypt Answer: Option D. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which algorithms are used to secure REST API from brute attacks and minimize the impact? appeared first on Majanto.

An engineer must ensure that the wireless network accomplishes fast, secure roaming by way of caching keys on the access points. Which key caching mechanism is enabled by default on a Cisco AireOS WLC?

A. SKC B. OKC C. 802.11r D. CCKM Answer: Option D. Explanation:  No answer description available for this question. Show AnswerDiscussion The post An engineer must ensure that the wireless network accomplishes fast, secure roaming by way of caching keys on the access points. Which key caching mechanism is enabled by default on a Cisco AireOS WLC? appeared… Read More »

A network engineer must connect two sites across a public network using a secure tunneling technology that supports multicast traffic. Which technology must be chosen?

A. IPsec B. GRE C. PPTP D. GRE over IPsec Answer: Option D. Explanation:  No answer description available for this question. Show AnswerDiscussion The post A network engineer must connect two sites across a public network using a secure tunneling technology that supports multicast traffic. Which technology must be chosen? appeared first on Majanto.