Free DEA-1TT5 Exam Braindumps (page: 14)

Page 13 of 29

A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events. Which IDPS technique uses a database that contains known attack patterns?

  1. Intrusion-based
  2. Policy-based
  3. Anomaly- Based
  4. Signature-based

Answer(s): C



Cloud tiering is the part of which tier?

  1. Policy
  2. Secondary Storage
  3. Primary Storage
  4. Application

Answer(s): D



What type of network connectivity is illustrated in the image below?

  1. Compute to storage connectivity
  2. Data center to data center connectivity
  3. Storage to hybrid cloud connectivity
  4. Compute to hybrid cloud connectivity

Answer(s): D



What is an accurate statement about Challenge Handshake Authentication Protocol (CHAP) control?

  1. Enables initiators and targets to authenticate each other by using a shared secret code
  2. Provides strong authentication for client-server applications by using secret-key cryptography
  3. Allows a client to access protected resources from a resource server on behalf of a resource owner
  4. Enables an organization to use authentication services from an identity provider

Answer(s): A






Post your Comments and Discuss Dell DEA-1TT5 exam with other Community members:

DEA-1TT5 Discussions & Posts