Securing Cisco Networks with Threat Detection and Analysis: 600-199 Exam
600-199 Questions & Answers
Exam Code: 600-199
Exam Name: Securing Cisco Networks with Threat Detection and Analysis
Q & A: 60 Q&As
Which describes the best method for preserving the chain of evidence?
A. Shut down the machine that is infected, remove the hard drive, and contact the local authorities.
B. Back up the hard drive, use antivirus software to clean the infected machine, and contact the local authorities.
C. Identify the infected machine, disconnect from the network, and contact the local authorities.
D. Allow user(s) to perform any business-critical tasks while waiting for local authorities.
Which will be provided as output when issuing the show processes cpu command on a Cisco IOS
A. router configuration
B. CPU utilization of device
C. memory used by device processes
D. interface processing statistics
Refer to the exhibit. Which protocol is used in this network traffic flow?
Which two types of data are relevant to investigating network security issues? (Choose two.)
B. device model numbers
D. routing tables
E. private IP addresses
In the context of a network security device like an IPS, which event would qualify as having the
A. remote code execution attempt
B. brute force login attempt
C. denial of service attack
D. instant messenger activity
Click http://www.lead2pass.com/600-199.html to download the full version.