This page was exported from Braindump2go Updated Real Microsoft MCITP Exam Questions [ http://www.mcitpguides.com ] Export date:Tue Oct 16 8:30:46 2018 / +0000 GMT ___________________________________________________ Title: [2017-New-Dumps]Braindump2go 600-199 PDF 60q Free Offered by Braindump2go[Q21-Q30] --------------------------------------------------- 2017 Feb. New Cisco 600-199 Exam Questions and Answers Updated Today!Free Download 600-199 Dumps and 600-199 VCE 60Q&As from www.braindump2go.com Today! 100% Real Exam Questions! 100% Exam Pass Guaranteed! 1.|NEW 600-199 Dumps and 600-199 PDF 60Q&As Download:http://www.braindump2go.com/600-199.html 2.|NEW 600-199 Exam Questions and 600-199 VCE Download:https://1drv.ms/f/s!AvI7wzKf6QBjgkm_DtWXO9h1Xwmc   QUESTION 21What is the maximum size of an IP datagram? A.    There is no maximum size.B.    It is limited only by the memory on the host computers at either end of the connection and the intermediate routers.C.    1024 bytesD.    65535 bytesE.    32768 bytes Answer: D QUESTION 22The IHL is a 4-bit field containing what measurement? A.    the number of 32-bit words in the IP headerB.    the size of the IP header, in bytesC.    the size of the entire IP datagram, in bytesD.    the number of bytes in the IP headerE.    the number of 32-bit words in the entire IP datagram Answer: A QUESTION 23What is the purpose of the TCP SYN flag? A.    to sequence each byte of data in a TCP connectionB.    to synchronize the initial sequence number contained in the Sequence Number header field with the other end of the connectionC.    to acknowledge outstanding data relative to the byte count contained in the Sequence Number header fieldD.    to sequence each byte of data in a TCP connection relative to the byte count contained in the Sequence Number header field Answer: B QUESTION 24Refer to the exhibit. What does the tcpdump command do?  A.    Capture all packets sourced from TCP port 1514, resolve DNS names, print all TCP packets with the SYN flag not equaling 0, and print the Ethernet header and all version information.B.    Capture all packets sourced from TCP port 1514, resolve DNS names, print all TCP packets except those containing the SYN flag, and print the Ethernet header and all version information.C.    Capture up to 1514 bytes, do not resolve DNS names, print all TCP packets except for those containing the SYN flag, and print the Ethernet header and be very verbose.D.    Capture up to 1514 bytes, do not resolve DNS names, print only TCP packets containing the SYN flag, and print the Ethernet header and be very verbose. Answer: D QUESTION 25What is the most effective way to save the data on a system for later forensic use? A.    Use a hard duplicator with write-block capabilities.B.    Copy the files to another disk.C.    Copy the disk file by file.D.    Shut down the system. Answer: A QUESTION 26In a network security policy, which procedure should be documented ahead of time to speed the communication of a network attack? A.    restoration plans for compromised systemsB.    credentials for packet capture devicesC.    Internet service provider contact informationD.    risk analysis tool credentialsE.    a method of communication and who to contact Answer: E QUESTION 27Which data is the most useful to determine if a network attack was occurring from inbound Internet traffic? A.    syslogs from all core switchesB.    NetfFow data from border firewall(s)C.    VPN connection logsD.    DNS request logsE.    Apache server logs Answer: B QUESTION 28Which step should be taken first when a server on a network is compromised? A.    Refer to the company security policy.B.    Email all server administrators.C.    Determine which server has been compromised.D.    Find the serial number of the server. Answer: A QUESTION 29After an attack has occurred, which two options should be collected to help remediate the problem? (Choose two.) A.    packet capturesB.    NAT translation tableC.    syslogs from affected devicesD.    connection table informationE.    NetFlow data Answer: CE QUESTION 30Which source should be used to recommend preventative measures against security vulnerabilities regardless of operating system or platform? A.    Microsoft security bulletinsB.    Cisco PSIRT noticesC.    Common Vulnerabilities and Exposure websiteD.    Mozilla Foundation security advisoriesE.    zero-day attack wiki Answer: C !!!RECOMMEND!!! 1.|NEW 600-199 Dumps and 600-199 PDF 60Q&As Download:http://www.braindump2go.com/600-199.html 2.|NEW 600-199 Study Guide: YouTube Video: YouTube.com/watch?v=AgHGXrA9L1M --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-02-17 02:34:32 Post date GMT: 2017-02-17 02:34:32 Post modified date: 2017-02-17 02:34:32 Post modified date GMT: 2017-02-17 02:34:32 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com