Which command would provide you with interface status information on a Cisco IOS router?

Which command would provide you with interface status information on a Cisco IOS router?A . show status interfaceB . show running-configC . show ip interface briefD . show interface snmpView AnswerAnswer: C

October 17, 2018 No Comments READ MORE +

Where should you report suspected security vulnerability in Cisco router software?

Where should you report suspected security vulnerability in Cisco router software?A . Cisco TACB . Cisco IOS EngineeringC . Cisco PSIRTD . Cisco SIOView AnswerAnswer: C

October 16, 2018 No Comments READ MORE +

Which will be provided as output when issuing the show processes cpu command on a Cisco IOS router?

Which will be provided as output when issuing the show processes cpu command on a Cisco IOS router?A . router configurationB . CPU utilization of deviceC . memory used by device processesD . interface processing statisticsView AnswerAnswer: B

October 1, 2018 No Comments READ MORE +

Which describes the best method for preserving the chain of evidence?

Which describes the best method for preserving the chain of evidence?A . Shut down the machine that is infected, remove the hard drive, and contact the local authorities.B . Back up the hard drive, use antivirus software to clean the infected machine, and contact the local authorities.C . Identify the...

September 25, 2018 No Comments READ MORE +

Which two activities would you typically be expected to perform as a Network Security Analyst? (Choose two.)

Which two activities would you typically be expected to perform as a Network Security Analyst? (Choose two.)A . Verify user login credentials.B . Troubleshoot firewall performance.C . Monitor database applications.D . Create security policies on routers.View AnswerAnswer: B,D

September 23, 2018 No Comments READ MORE +

When an IDS generates an alert for a correctly detected network attack, what is this event called?

When an IDS generates an alert for a correctly detected network attack, what is this event called?A . false positiveB . true negativeC . true positiveD . false negativeView AnswerAnswer: C

September 19, 2018 No Comments READ MORE +

When investigating potential network security issues, which two pieces of useful information would be found in a syslog message? (Choose two.)

When investigating potential network security issues, which two pieces of useful information would be found in a syslog message? (Choose two.)A . product serial numberB . MAC addressC . IP addressD . product model numberE . broadcast addressView AnswerAnswer: B,C

September 15, 2018 No Comments READ MORE +

When is it recommended to establish a traffic profile baseline for your network?

When is it recommended to establish a traffic profile baseline for your network?A . outside of normal production hoursB . during a DDoS attackC . during normal production hoursD . during monthly file server backupView AnswerAnswer: C

September 3, 2018 No Comments READ MORE +

Which network management protocol relies on multiple connections between a managed device and the management station where such connections can be independently initiated by either side?

Which network management protocol relies on multiple connections between a managed device and the management station where such connections can be independently initiated by either side?A . SSHB . SNMPC . TelnetD . NetFlowView AnswerAnswer: B

September 2, 2018 No Comments READ MORE +

Where should you report suspected security vulnerability in Cisco router software?

Where should you report suspected security vulnerability in Cisco router software?A . Cisco TACB . Cisco IOS EngineeringC . Cisco PSIRTD . Cisco SIOView AnswerAnswer: C

August 26, 2018 No Comments READ MORE +