- All Exams Instant Download
Which two types of data are relevant to investigating network security issues? (Choose two.)
Which two types of data are relevant to investigating network security issues? (Choose two.)A . NetFlowB . device model numbersC . syslogD . routing tablesE . private IP addressesView AnswerAnswer: A,C
Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet? (Choose two.)
Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet? (Choose two.) A. Completely disconnect the network from the Internet. B. Deploy a stateful edge firewall. C. Buy an insurance policy A. against attack-related business losses. D. Implement a password management...
When an IDS generates an alert for a correctly detected network attack, what is this event called?
When an IDS generates an alert for a correctly detected network attack, what is this event called?A . false positiveB . true negativeC . true positiveD . false negativeView AnswerAnswer: C
Which piece of information is critical to begin your network investigation?
A server administrator tells you that the server network is potentially under attack. Which piece of information is critical to begin your network investigation?A . cabinet location of the serversB . administrator password for the serversC . OS that is used on the serversD . IP addresses/subnets used for the...
When is it recommended to establish a traffic profile baseline for your network?
When is it recommended to establish a traffic profile baseline for your network?A . outside of normal production hoursB . during a DDoS attackC . during normal production hoursD . during monthly file server backupView AnswerAnswer: C
Which command would provide you with interface status information on a Cisco IOS router?
Which command would provide you with interface status information on a Cisco IOS router?A . show status interfaceB . show running-configC . show ip interface briefD . show interface snmpView AnswerAnswer: C
Which protocol is used in this network traffic flow?
Refer to the exhibit. Which protocol is used in this network traffic flow?A . SNMPB . SSHC . DNSD . TelnetView AnswerAnswer: B
Which DNS Query Types pertains to email?
Refer to the exhibit. Which DNS Query Types pertains to email?A . A?B . NS?C . SOA?D . PTR?E . MX?F . TXT?View AnswerAnswer: E
Which piece of information is critical to begin your network investigation?
A server administrator tells you that the server network is potentially under attack. Which piece of information is critical to begin your network investigation?A . cabinet location of the serversB . administrator password for the serversC . OS that is used on the serversD . IP addresses/subnets used for the...
Which protocol is typically considered critical for LAN operation?
Which protocol is typically considered critical for LAN operation?A . BGPB . ARPC . SMTPD . GREView AnswerAnswer: B