Free of 600-199 pdf exam materials and study guides for Cisco certification for IT candidates, Real Success Guaranteed with Updated 600-199 pdf dumps vce Materials. 100% PASS Securing Cisco Networks with Threat Detection and Analysis exam Today!
2026 New 600-199 Exam Dumps with PDF and VCE Free: https://www.2passeasy.com/dumps/600-199/
Q1. What does the acronym "CSIRT" stand for?
A. Computer Security Identification Response Team
B. Cisco Security Incident Response Team
C. Cisco Security Identification Response Team
D. Computer Security Incident Response Team
Answer: D
Q2. What is the most important reason for documenting an incident?
A. It could be used as evidence for a criminal case.
B. It could be used to identify the person responsible for allowing it into the network.
C. To train others on what they should not do.
D. To use it for future incident response handling.
Answer: A
Q3. In the packet captured from tcpdump, which fields match up with the lettered parameters?
A. A.Source and destination IP addresses,B.Source and destination Ethernet addresses,C.Source and destination TCP port numbers,D.TCP acknowledgement number,E.IP options
B. A.Source and destination Ethernet addresses,B.Source and destination IP addresses,C.Source and destination TCP port numbers,D.TCP sequence number,E.TCP options
C. A.Source and destination Ethernet addresses,B.Source and destination IP addresses,C.Source and destination TCP port numbers,D.TCP acknowledgement number,E.IP options
D. A.Source and destination Ethernet addresses,B.Source and destination IP addresses,C.Source and destination TCP port numbers,D.TCP sequence number,E.IP options
Answer: B
Q4. Which data is the most useful to determine if a network attack was occurring from inbound Internet traffic?
A. syslogs from all core switches
B. NetfFow data from border firewall(s)
C. VPN connection logs
D. DNS request logs
E. Apache server logs
Answer: B
Q5. The IHL is a 4-bit field containing what measurement?
A. the number of 32-bit words in the IP header
B. the size of the IP header, in bytes
C. the size of the entire IP datagram, in bytes
D. the number of bytes in the IP header
E. the number of 32-bit words in the entire IP datagram
Answer: A
Q6. Refer to the exhibit.
Which two personal administrators should be involved to investigate further? (Choose two.)
A. email administrator
B. IPS administrator
C. DNS administrator
D. desktop administrator
E. security administrator
Answer: C, D
Q7. Which two measures would you recommend to reduce the likelihood of a successfully executed network attack from the Internet? (Choose two.)
A. Completely disconnect the network from the Internet.
B. Deploy a stateful edge firewall.
C. Buy an insurance policy against attack-related business losses.
D. Implement a password management policy for remote users.
Answer: B, D
Q8. Which two tools are used to help with traffic identification? (Choose two.)
A. network sniffer
B. ping
C. traceroute
D. route table
E. NetFlow
F. DHCP
Answer: A, E
Q9. In the context of a network security device like an IPS, which event would qualify as having the highest severity?
A. remote code execution attempt
B. brute force login attempt
C. denial of service attack
D. instant messenger activity
Answer: A
Q10. Which four tools are used during an incident to collect data? (Choose four.)
A. Sniffer
B. TCPDump
C. FTK
D. EnCase
E. ABC
F. ASA
G. Microsoft Windows 7
Answer: A, B, C, D