Cisco 600-199 - Securing Cisco Networks with Threat Detection and Analysis Exam
Page: 1 / 12
Total 58 questions
Question #1 (Topic: )
Which network management protocol relies on multiple connections between a managed
device and the management station where such connections can be independently initiated
by either side?
device and the management station where such connections can be independently initiated
by either side?
A. SSH
B. SNMP
C. Telnet
D. NetFlow
Answer: B
Question #2 (Topic: )
When an IDS generates an alert for a correctly detected network attack, what is this event
called?
called?
A. false positive
B. true negative
C. true positive
D. false negative
Answer: C
Question #3 (Topic: )
When is it recommended to establish a traffic profile baseline for your network?
A. outside of normal production hours
B. during a DDoS attack
C. during normal production hours
D. during monthly file server backup
Answer: C
Question #4 (Topic: )
Which two activities would you typically be expected to perform as a Network Security
Analyst? (Choose two.)
Analyst? (Choose two.)
A. Verify user login credentials.
B. Troubleshoot firewall performance.
C. Monitor database applications.
D. Create security policies on routers.
Answer: B,D
Question #5 (Topic: )
Which protocol is typically considered critical for LAN operation?
A. BGP
B. ARP
C. SMTP
D. GRE
Answer: B