Cisco 600-199 - Securing Cisco Networks with Threat Detection and Analysis Exam
Page: 2 / 12
Total 58 questions
Question #6 (Topic: )
Which two measures would you recommend to reduce the likelihood of a successfully
executed network attack from the Internet? (Choose two.)
executed network attack from the Internet? (Choose two.)
A. Completely disconnect the network from the Internet.
B. Deploy a stateful edge firewall.
C. Buy an insurance policy against attack-related business losses.
D. Implement a password management policy for remote users.
Answer: B,D
Question #7 (Topic: )
Which attack exploits incorrect boundary checking in network software?
A. Slowloris
B. buffer overflow
C. man-in-the-middle
D. Smurf
Answer: B
Question #8 (Topic: )
Where should you report suspected security vulnerability in Cisco router software?
A. Cisco TAC
B. Cisco IOS Engineering
C. Cisco PSIRT
D. Cisco SIO
Answer: C
Question #9 (Topic: )
When investigating potential network security issues, which two pieces of useful
information would be found in a syslog message? (Choose two.)
information would be found in a syslog message? (Choose two.)
A. product serial number
B. MAC address
C. IP address
D. product model number
E. broadcast address
Answer: B,C
Question #10 (Topic: )
Which command would provide you with interface status information on a Cisco IOS
router?
router?
A. show status interface
B. show running-config
C. show ip interface brief
D. show interface snmp
Answer: C