[Full Version] 2017 Latest Lead2pass 600-199 Questions & Answers PDF Free Download (21-30)

2017 February Cisco Official New Released 600-199 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

Are you worring about the 600-199 exam? With the complete collection of 600-199 exam questions and answers, Lead2pass has assembled to take you through your 600-199 exam preparation. Each Q & A set will test your existing knowledge of 600-199 fundamentals, and offer you the latest training products that guarantee you passing 600-199 exam easily.

Following questions and answers are all new published by Cisco Official Exam Center: http://www.lead2pass.com/600-199.html

QUESTION 21
What is the maximum size of an IP datagram?

A.    There is no maximum size.
B.    It is limited only by the memory on the host computers at either end of the connection and the
intermediate routers.
C.    1024 bytes
D.    65535 bytes
E.    32768 bytes

Answer: D

QUESTION 22
The IHL is a 4-bit field containing what measurement?

A.    the number of 32-bit words in the IP header
B.    the size of the IP header, in bytes
C.    the size of the entire IP datagram, in bytes
D.    the number of bytes in the IP header
E.    the number of 32-bit words in the entire IP datagram

Answer: A

QUESTION 23
What is the purpose of the TCP SYN flag?

A.    to sequence each byte of data in a TCP connection
B.    to synchronize the initial sequence number contained in the Sequence Number header field with the
other end of the connection
C.    to acknowledge outstanding data relative to the byte count contained in the Sequence Number header
field
D.    to sequence each byte of data in a TCP connection relative to the byte count contained in the Sequence
Number header field

Answer: B

QUESTION 24
Refer to the exhibit. What does the tcpdump command do?

A.    Capture all packets sourced from TCP port 1514, resolve DNS names, print all TCP packets with
the SYN flag not equaling 0, and print the Ethernet header and all version information.
B.    Capture all packets sourced from TCP port 1514, resolve DNS names, print all TCP packets except
those containing the SYN flag, and print the Ethernet header and all version information.
C.    Capture up to 1514 bytes, do not resolve DNS names, print all TCP packets except for those containing
the SYN flag, and print the Ethernet header and be very verbose.
D.    Capture up to 1514 bytes, do not resolve DNS names, print only TCP packets containing the SYN flag,
and print the Ethernet header and be very verbose.

Answer: D

QUESTION 25
What is the most effective way to save the data on a system for later forensic use?

A.    Use a hard duplicator with write-block capabilities.
B.    Copy the files to another disk.
C.    Copy the disk file by file.
D.    Shut down the system.

Answer: A

QUESTION 26
In a network security policy, which procedure should be documented ahead of time to speed the communication of a network attack?

A.    restoration plans for compromised systems
B.    credentials for packet capture devices
C.    Internet service provider contact information
D.    risk analysis tool credentials
E.    a method of communication and who to contact

Answer: E

QUESTION 27
Which data is the most useful to determine if a network attack was occurring from inbound Internet traffic?

A.    syslogs from all core switches
B.    NetfFow data from border firewall(s)
C.    VPN connection logs
D.    DNS request logs
E.    Apache server logs

Answer: B

QUESTION 28
Which step should be taken first when a server on a network is compromised?

A.    Refer to the company security policy.
B.    Email all server administrators.
C.    Determine which server has been compromised.
D.    Find the serial number of the server.

Answer: A

QUESTION 29
After an attack has occurred, which two options should be collected to help remediate the problem? (Choose two.)

A.    packet captures
B.    NAT translation table
C.    syslogs from affected devices
D.    connection table information
E.    NetFlow data

Answer: CE

QUESTION 30
Which source should be used to recommend preventative measures against security vulnerabilities regardless of operating system or platform?

A.    Microsoft security bulletins
B.    Cisco PSIRT notices
C.    Common Vulnerabilities and Exposure website
D.    Mozilla Foundation security advisories
E.    zero-day attack wiki

Answer: C

At Lead2pass, we are positive that our Cisco 600-199 dumps with questions and answers PDF provide most in-depth solutions for individuals that are preparing for the Cisco 600-199 exam. Our updated 600-199 braindumps will allow you the opportunity to know exactly what to expect on the exam day and ensure that you can pass the exam beyond any doubt.

600-199 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDaEE3N2RTdEFjRU0

2017 Cisco 600-199 exam dumps (All 60 Q&As) from Lead2pass:

http://www.lead2pass.com/600-199.html [100% Exam Pass Guaranteed]