00:00

QUESTION 36

- (Topic 2)
Which of the following categories of the network management model is used to detect and log network problems or device failures?

Correct Answer: A

QUESTION 37

- (Topic 2)
Which of the following refers to the ability to ensure that the data is not modified or tampered with?

Correct Answer: B

QUESTION 38

- (Topic 2)
You work as a Software Developer for Mansoft Inc. You, together with a team, develop a distributed application that processes orders from multiple types of clients. The application uses SQL Server to store data for all orders. The application does not implement any custom performance counters. After the application is deployed to production, it must be monitored for performance spikes. What will you do to monitor performance spikes in the application in a deployment environment?
Each correct answer represents a part of the solution. Choose all that apply.

Correct Answer: ACD

QUESTION 39

- (Topic 3)
Which of the following are the types of Intrusion detection system?

Correct Answer: CD

QUESTION 40

- (Topic 2)
Which of the following protocols implements VPN using IPSec?

Correct Answer: D