Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Cisco Official New Released 600-199
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/600-199.html
Securing Cisco Networks with Threat Detection and Analysis
Question No: 21
Which event is actionable?
-
SSH login failed
-
Telnet login failed
-
traffic flow started
-
reverse shell detected
Answer: D
Question No: 22
Which would be classified as a remote code execution attempt?
-
OLE stack overflow detected
-
null login attempt
-
BitTorrent activity detected
-
IE ActiveX DoS
Answer: A
Question No: 23
Given the signature quot;SQL Table Manipulation Detectedquot;, which site may trigger a false positive?
-
a company selling discount dining-room table inserts
-
a large computer hardware company
-
a small networking company
-
a biotech company
Answer: A
Question No: 24
Which is considered to be anomalous activity?
-
an alert context buffer containing traffic to amazon.com
-
an alert context buffer containing SSH traffic
-
an alert context buffer containing an FTP server SYN scanning your network
-
an alert describing an anonymous login attempt to an FTP server
Answer: C
Question No: 25
If an alert that pertains to a remote code execution attempt is seen on your network, which step is unlikely to help?
-
looking for anomalous traffic
-
looking for reconnaissance activity
-
restoring the machine to a known good backup
-
clearing the event store to see if future events indicate malicious activity
Answer: D
Question No: 26
Refer to the exhibit.
In the tcpdump output, what is the sequence number that is represented by XXXXX?
A. 82080
B. 82081
C. 83448
D. 83449
E. 98496
F. 98497
Answer: C
Question No: 27
Refer to the exhibit.
Based on the traffic captured in the tcpdump, what is occurring?
-
The device is powered down and is not on the network.
-
The device is reachable and a TCP connection was established on port 23.
-
The device is up but is not responding on port 23.
-
The device is up but is not responding on port 51305.
-
The resend flag is requesting the connection again.
Answer: C
Question No: 28
Which three statements are true about the IP fragment offset? (Choose three.)
-
A fragment offset of 0 indicates that it is the first in a series of fragments.
-
A fragment offset helps determine the position of the fragment within the reassembled datagram.
-
A fragment offset number refers to the number of fragments.
-
A fragment offset is measured in 8-byte units.
-
A fragment offset is measured in 16-byte units.
Answer: A,B,D
Question No: 29
Which two tools are used to help with traffic identification? (Choose two.)
-
network sniffer
-
ping
-
traceroute
-
route table
-
NetFlow
-
DHCP
Answer: A,E
Question No: 30
Refer to the exhibit.
Based on the tcpdump capture, which three statements are true? (Choose three.)
-
Host 10.10.10.20 is requesting the MAC address of host 10.10.10.10 using ARP.
-
Host 10.10.10.10 is requesting the MAC address of host 10.10.10.20.
-
The ARP request is unicast.
-
The ARP response is unicast.
-
The ARP request is broadcast.
-
Host 10.10.10.20 is using the MAC address of ffff.ffff.ffff.
Answer: B,D,E