Which command would provide you with interface status information on a Cisco IOS router?
Which command would provide you with interface status information on a Cisco IOS router?A . show status interfaceB . show running-configC . show ip interface briefD . show interface snmpView AnswerAnswer: C
Where should you report suspected security vulnerability in Cisco router software?
Where should you report suspected security vulnerability in Cisco router software?A . Cisco TACB . Cisco IOS EngineeringC . Cisco PSIRTD . Cisco SIOView AnswerAnswer: C
Which will be provided as output when issuing the show processes cpu command on a Cisco IOS router?
Which will be provided as output when issuing the show processes cpu command on a Cisco IOS router?A . router configurationB . CPU utilization of deviceC . memory used by device processesD . interface processing statisticsView AnswerAnswer: B
Which describes the best method for preserving the chain of evidence?
Which describes the best method for preserving the chain of evidence?A . Shut down the machine that is infected, remove the hard drive, and contact the local authorities.B . Back up the hard drive, use antivirus software to clean the infected machine, and contact the local authorities.C . Identify the...
Which two activities would you typically be expected to perform as a Network Security Analyst? (Choose two.)
Which two activities would you typically be expected to perform as a Network Security Analyst? (Choose two.)A . Verify user login credentials.B . Troubleshoot firewall performance.C . Monitor database applications.D . Create security policies on routers.View AnswerAnswer: B,D
When an IDS generates an alert for a correctly detected network attack, what is this event called?
When an IDS generates an alert for a correctly detected network attack, what is this event called?A . false positiveB . true negativeC . true positiveD . false negativeView AnswerAnswer: C
When investigating potential network security issues, which two pieces of useful information would be found in a syslog message? (Choose two.)
When investigating potential network security issues, which two pieces of useful information would be found in a syslog message? (Choose two.)A . product serial numberB . MAC addressC . IP addressD . product model numberE . broadcast addressView AnswerAnswer: B,C
When is it recommended to establish a traffic profile baseline for your network?
When is it recommended to establish a traffic profile baseline for your network?A . outside of normal production hoursB . during a DDoS attackC . during normal production hoursD . during monthly file server backupView AnswerAnswer: C
Which network management protocol relies on multiple connections between a managed device and the management station where such connections can be independently initiated by either side?
Which network management protocol relies on multiple connections between a managed device and the management station where such connections can be independently initiated by either side?A . SSHB . SNMPC . TelnetD . NetFlowView AnswerAnswer: B
Where should you report suspected security vulnerability in Cisco router software?
Where should you report suspected security vulnerability in Cisco router software?A . Cisco TACB . Cisco IOS EngineeringC . Cisco PSIRTD . Cisco SIOView AnswerAnswer: C