Cisco 600-199 - Securing Cisco Networks with Threat Detection and Analysis Exam

Page:    1 / 12   
Total 58 questions

Which network management protocol relies on multiple connections between a managed device and the management station where such connections can be independently initiated by either side?

  • A. SSH
  • B. SNMP
  • C. Telnet
  • D. NetFlow


Answer : B

When an IDS generates an alert for a correctly detected network attack, what is this event called?

  • A. false positive
  • B. true negative
  • C. true positive
  • D. false negative


Answer : C

When is it recommended to establish a traffic profile baseline for your network?

  • A. outside of normal production hours
  • B. during a DDoS attack
  • C. during normal production hours
  • D. during monthly file server backup


Answer : C

Which two activities would you typically be expected to perform as a Network Security
Analyst? (Choose two.)

  • A. Verify user login credentials.
  • B. Troubleshoot firewall performance.
  • C. Monitor database applications.
  • D. Create security policies on routers.


Answer : B,D

Which protocol is typically considered critical for LAN operation?

  • A. BGP
  • B. ARP
  • C. SMTP
  • D. GRE


Answer : B

Page:    1 / 12   
Total 58 questions