Download New Latest (May) Cisco 600-199 Actual Tests Topic 1, Information Gathering and Security Foundations

By | May 14, 2015

Ensurepass

 

Topic 1, Information Gathering and Security Foundations

 

 


Exam A

 

QUESTION 1

Which network management protocol relies on multiple connections between a managed device and the management station where such connections can be independently initiated by either side?

 

A.

SSH

B.

SNMP

C.

Telnet

D.

NetFlow

 

Answer: B

Explanation:

 

QUESTION 2

When an IDS generates an alert for a correctly detected network attack, what is this event called?

 

A.

false positive

B.

true negative

C.

true positive

D.

false negative

 

Answer: C

Explanation:

 

QUESTION 3

When is it recommended to establish a traffic profile baseline for your network?

 

A.

outside of normal production hours

B.

during a DDoS attack

C.

during normal production hours

D.

during monthly file server backup

 

Answer: C

Explanation:

 

QUESTION 4

Which two activities would you typically be expected to perform as a Network Security Analyst? (Choose two.)

 

A.

Verify user login credentials.

B.

Troubleshoot firewall performance.

C.

Monitor database applications.

D.

Create security policies on routers.

 

Answer: BD

Explanation:

 

QUESTION 5

Which protocol is typically considered critical for LAN operation?

 

A.

BGP

B.

ARP

C.

SMTP

D.

GRE

 

Answer: B

Explanation:

 

QUESTION 6

Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet? (Choose two.)

 

A.

Completely disconnect the network from the Internet.

B.

Deploy a stateful edge firewall.

C.

Buy an insurance policy against attack-related business losses.

D.

Implement a password management policy for remote users.

 

Answer: BD

Explanation:

 

QUESTION 7

Which attack exploits incorrect boundary checking in network software?

 

A.

Slowloris

B.

buffer overflow

C.

man-in-the-middle

D.

Smurf

 

Answer: B

Explanation:

 

QUESTION 8

Where should you report suspected security vulnerability in Cisco router software?

 

A.

Cisco TAC

B.

Cisco IOS Engineering

C.

Cisco PSIRT

D.

Cisco SIO

 

Answer: C

Explanation:

Free VCE & PDF File for Cisco 600-199 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …