When is it recommended to establish a traffic profile baseline for your network?

When is it recommended to establish a traffic profile baseline for your network?A . outside of normal production hoursB . during a DDoS attackC . during normal production hoursD . during monthly file server backupView AnswerAnswer: C

December 30, 2018 No Comments READ MORE +

In the context of a network security device like an IPS, which event would qualify as having the highest severity?

In the context of a network security device like an IPS, which event would qualify as having the highest severity?A . remote code execution attemptB . brute force login attemptC . denial of service attackD . instant messenger activityView AnswerAnswer: A

December 30, 2018 No Comments READ MORE +

Which DNS Query Types pertains to email?

Refer to the exhibit. Which DNS Query Types pertains to email?A . A?B . NS?C . SOA?D . PTR?E . MX?F . TXT?View AnswerAnswer: E

December 30, 2018 No Comments READ MORE +

Which attack exploits incorrect boundary checking in network software?

Which attack exploits incorrect boundary checking in network software?A . SlowlorisB . buffer overflowC . man-in-the-middleD . SmurfView AnswerAnswer: B

December 20, 2018 No Comments READ MORE +

In the context of a network security device like an IPS, which event would qualify as having the highest severity?

In the context of a network security device like an IPS, which event would qualify as having the highest severity?A . remote code execution attemptB . brute force login attemptC . denial of service attackD . instant messenger activityView AnswerAnswer: A

December 16, 2018 No Comments READ MORE +

Which will be provided as output when issuing the show processes cpu command on a Cisco IOS router?

Which will be provided as output when issuing the show processes cpu command on a Cisco IOS router?A . router configurationB . CPU utilization of deviceC . memory used by device processesD . interface processing statisticsView AnswerAnswer: B

December 13, 2018 No Comments READ MORE +

Which piece of information is critical to begin your network investigation?

A server administrator tells you that the server network is potentially under attack. Which piece of information is critical to begin your network investigation?A . cabinet location of the serversB . administrator password for the serversC . OS that is used on the serversD . IP addresses/subnets used for the...

December 10, 2018 No Comments READ MORE +

Which will be provided as output when issuing the show processes cpu command on a Cisco IOS router?

Which will be provided as output when issuing the show processes cpu command on a Cisco IOS router?A . router configurationB . CPU utilization of deviceC . memory used by device processesD . interface processing statisticsView AnswerAnswer: B

December 1, 2018 No Comments READ MORE +

Which attack exploits incorrect boundary checking in network software?

Which attack exploits incorrect boundary checking in network software?A . SlowlorisB . buffer overflowC . man-in-the-middleD . SmurfView AnswerAnswer: B

November 23, 2018 No Comments READ MORE +

Which event is likely to be a false positive?

Which event is likely to be a false positive?A . Internet Relay Chat signature with an alert context buffer containing #IPS_ROCS YayB . a signature addressing an ActiveX vulnerability alert on a Microsoft developer network documentation pageC . an alert for a long HTTP request with an alert context buffer...

November 22, 2018 No Comments READ MORE +