Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A network architect is choosing design options for a new SD-WAN installation that has the following requirements:

    All network traffic from the cloud must pass through inspection devices in a dedicated data center.

    Ensure redundancy.

    Centralize egress traffic.

Which of the following network topologies best meets these requirements?

A.

Point-to-point

B.

Hub-and-spoke

C.

Star

D.

Partial mesh

After a company migrated all services to the cloud, the security auditor discovers many users have administrator roles on different services. The company needs a solution that:

    Protects the services on the cloud

    Limits access to administrative roles

    Creates a policy to approve requests for administrative roles on critical services within a limited time

    Forces password rotation for administrative roles

    Audits usage of administrative roles

Which of the following is the best way to meet the company's requirements?

A.

Privileged access management

B.

Session-based token

C.

Conditional access

D.

Access control list

A company is expanding its network and needs to ensure improved stability and reliability. The proposed solution must fulfill the following requirements:

    Detection and prevention of network loops

    Automatic configuration of ports

    Standard protocol (not proprietary)

Which of the following protocols is the most appropriate?

A.

STP

B.

SIP

C.

RTSP

D.

BGP

A network architect is creating a network topology for a global SD-WAN deployment. The business has offices in Asia, Europe, and the United States and makes use of data centers in theUnited States and Europe. Most traffic between sites must have the lowest latency possible. Which of the following topologies best meets this requirement?

A.

Star

B.

Spine-and-leaf

C.

Mesh

D.

Hub-and-spoke

An organization wants to evaluate network behavior with a network monitoring tool that is not inline. The organization will use the logs for further correlation and analysis of potential threats. Which of the following is the best solution?

A.

Syslog to a common dashboard used in the NOC

B.

SNMP trap with log analytics

C.

SSL decryption of network packets with preconfigured alerts

D.

NetFlow to feed into the SIEM

Server A (10.2.3.9) needs to access Server B (10.2.2.7) within the cloud environment since theyare segmented into different network sections. All external inbound traffic must be blocked to those servers. Which of the following need to be configured to appropriately secure the cloud network? (Choose two.)

A.

Network security group rule: allow 10.2.3.9 to 10.2.2.7

B.

Network security group rule: allow 10.2.0.0/16 to 0.0.0.0/0

C.

Network security group rule: deny 0.0.0.0/0 to 10.2.0.0/16

D.

Firewall rule: deny 10.2.0.0/16 to 0.0.0.0/0

E.

Firewall rule: allow 10.2.0.0/16 to 0.0.0.0/0

F.

Network security group rule: deny 10.2.0.0/16 to 0.0.0.0/0

A network administrator recently deployed new Wi-Fi 6E access points in an office and enabled 6GHz coverage. Users report that when they are connected to the new 6GHz SSID, the performance is worse than the 5GHz SSID. The network administrator suspects that there is a source of 6GHz interference in the office. Using the troubleshooting methodology, which of the following actions should the network administrator do next?

A.

Test to see if the changes have improved network performance.

B.

Use a spectrum analyzer and check the 6GHz spectrum.

C.

Document the list of channels that are experiencing interference.

D.

Change the channels being used by the 6GHz radios in the APs.

A network security engineer must secure a web application running on virtual machines in a public cloud. The virtual machines are behind an application load balancer. Which of the following technologies should the engineer use to secure the virtual machines? (Choose two.)

A.

CDN

B.

DLP

C.

IDS

D.

WAF

E.

SIEM

F.

NSG

A cafe uses a tablet-based point-of-sale system. Customers are complaining that their food is taking too long to arrive. During an investigation, the following is noticed:

    Every kitchen printer did not print the orders

    Payments are processing correctly

    The cloud-based system has record of the orders

    This issue occurred when the cafe was busy

Which of the following is the best way to mitigate this issue?

A.

Updating the application

B.

Adding an access point exclusively for the kitchen

C.

Upgrading the kitchen printers' wireless dongles

D.

Assigning the kitchen printers static IP addresses

A security architect needs to increase the security controls around computer hardware installations. The requirements are:

    Auditable access logs to computer rooms

    Alerts for unauthorized access attempts

    Remote visibility to the inside of computer rooms

Which of the following controls best meet these requirements? (Choose two.)

A.

Video surveillance

B.

NFC access cards

C.

Motion sensors

D.

Locks and keys

E.

Security patrols

F.

Automated lighting