Which two types of data are relevant to investigating network security issues? (Choose two.)
Which two types of data are relevant to investigating network security issues? (Choose two.)A . NetFlowB . device model numbersC . syslogD . routing tablesE . private IP addressesView AnswerAnswer: A,C
Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet? (Choose two.)
Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet? (Choose two.) A. Completely disconnect the network from the Internet. B. Deploy a stateful edge firewall. C. Buy an insurance policy A. against attack-related business losses. D. Implement a password management...
When an IDS generates an alert for a correctly detected network attack, what is this event called?
When an IDS generates an alert for a correctly detected network attack, what is this event called?A . false positiveB . true negativeC . true positiveD . false negativeView AnswerAnswer: C
Which piece of information is critical to begin your network investigation?
A server administrator tells you that the server network is potentially under attack. Which piece of information is critical to begin your network investigation?A . cabinet location of the serversB . administrator password for the serversC . OS that is used on the serversD . IP addresses/subnets used for the...
When is it recommended to establish a traffic profile baseline for your network?
When is it recommended to establish a traffic profile baseline for your network?A . outside of normal production hoursB . during a DDoS attackC . during normal production hoursD . during monthly file server backupView AnswerAnswer: C
Which command would provide you with interface status information on a Cisco IOS router?
Which command would provide you with interface status information on a Cisco IOS router?A . show status interfaceB . show running-configC . show ip interface briefD . show interface snmpView AnswerAnswer: C
Which protocol is used in this network traffic flow?
Refer to the exhibit. Which protocol is used in this network traffic flow?A . SNMPB . SSHC . DNSD . TelnetView AnswerAnswer: B
Which DNS Query Types pertains to email?
Refer to the exhibit. Which DNS Query Types pertains to email?A . A?B . NS?C . SOA?D . PTR?E . MX?F . TXT?View AnswerAnswer: E
Which piece of information is critical to begin your network investigation?
A server administrator tells you that the server network is potentially under attack. Which piece of information is critical to begin your network investigation?A . cabinet location of the serversB . administrator password for the serversC . OS that is used on the serversD . IP addresses/subnets used for the...
Which protocol is typically considered critical for LAN operation?
Which protocol is typically considered critical for LAN operation?A . BGPB . ARPC . SMTPD . GREView AnswerAnswer: B