Which network management protocol relies on multiple connections between a managed device and the management station where such connections can be independently initiated by either side?
Answer : B
When an IDS generates an alert for a correctly detected network attack, what is this event called?
Answer : C
When is it recommended to establish a traffic profile baseline for your network?
Answer : C
Which two activities would you typically be expected to perform as a Network Security
Analyst? (Choose two.)
Answer : B,D