[2017-New-Dumps]Cisco Official 600-199 Questions and Answers Free Updated in Braindump2go[Q41-Q50]

600-1992017 Feb. New Cisco 600-199 Exam Questions and Answers Updated Today!
Free Download 600-199 Dumps and 600-199 VCE 60Q&As from www.braindump2go.com Today!

100% Real Exam Questions! 100% Exam Pass Guaranteed!

1.|NEW 600-199 Dumps and 600-199 PDF 60Q&As Download:
http://www.braindump2go.com/600-199.html

2.|NEW 600-199 Exam Questions and 600-199 VCE Download:
https://1drv.ms/f/s!AvI7wzKf6QBjgkm_DtWXO9h1Xwmc

 

QUESTION 41
Where should you report suspected security vulnerability in Cisco router software?

A.    Cisco TAC
B.    Cisco IOS Engineering
C.    Cisco PSIRT
D.    Cisco SIO

Answer: C

QUESTION 42
When investigating potential network security issues, which two pieces of useful information would be found in a syslog message? (Choose two.)

A.    product serial number
B.    MAC address
C.    IP address
D.    product model number
E.    broadcast address

Answer: BC

QUESTION 43
Which command would provide you with interface status information on a Cisco IOS router?

A.    show status interface
B.    show running-config
C.    show ip interface brief
D.    show interface snmp

Answer: C

QUESTION 44
Refer to the exhibit. Which DNS Query Types pertains to email?
 

A.    A?
B.    NS?
C.    SOA?
D.    PTR?
E.    MX?
F.    TXT?

Answer: E

QUESTION 45
A server administrator tells you that the server network is potentially under attack. Which piece of information is critical to begin your network investigation?

A.    cabinet location of the servers
B.    administrator password for the servers
C.    OS that is used on the servers
D.    IP addresses/subnets used for the servers

Answer: D

QUESTION 46
Refer to the exhibit. In the packet captured from tcpdump, which fields match up with the lettered parameters?
 

A.    A.Source and destination IP addresses,
B.Source and destination Ethernet addresses,
C.Source and destination TCP port numbers,
D.TCP acknowledgement number,
E.IP options
B.    A.Source and destination Ethernet addresses,
B.Source and destination IP addresses,
C.Source and destination TCP port numbers,
D.TCP sequence number,
E.TCP options
C.    A.Source and destination Ethernet addresses,
B.Source and destination IP addresses,
C.Source and destination TCP port numbers,
D.TCP acknowledgement number,
E.IP options
D.    A.Source and destination Ethernet addresses,
B.Source and destination IP addresses,
C.Source and destination TCP port numbers,
D.TCP sequence number,
E.IP options

Answer: B

QUESTION 47
For TCP and UDP, what is the correct range of well-known port numbers?

A.    0 – 1023
B.    1 – 1024
C.    1 – 65535
D.    0 – 65535
E.    024 – 65535

Answer: A

QUESTION 48
Which three symptoms are best used to detect a TCP SYN flood attack? (Choose three.)

A.    high memory utilization on target server
B.    large number of sockets in SYN_RECV state on target server
C.    network monitoring devices report large number of unACKed SYNs sent to target server
D.    target server crashes repeatedly
E.    user experience with target server is slow or unresponsive

Answer: BCE

QUESTION 49
Which two statements about the IPv4 TTL field are true? (Choose two.)

A.    If the TTL is 0, the datagram is automatically retransmitted.
B.    Each router that forwards an IP datagram reduces the TTL value by one.
C.    It is used to limit the lifetime of an IP datagram on the Internet.
D.    It is used to track IP datagrams on the Internet.

Answer: BC

QUESTION 50
What are four steps to manage incident response handling? (Choose four.)

A.    preparation
B.    qualify
C.    identification
D.    who
E.    containment
F.    recovery
G.    eradication
H.    lessons learned

Answer: ACEH


!!!RECOMMEND!!!

1.|NEW 600-199 Dumps and 600-199 PDF 60Q&As Download:
http://www.braindump2go.com/600-199.html

2.|NEW 600-199 Study Guide:
https://youtu.be/AgHGXrA9L1M