Which threat-detection feature is used to keep track of suspected attackers who create connections to too many hosts or ports?

Which threat-detection feature is used to keep track of suspected attackers who create connections
to too many hosts or ports?

Which threat-detection feature is used to keep track of suspected attackers who create connections
to too many hosts or ports?

A.
complex threat detection

B.
scanning threat detection

C.
basic threat detection

D.
advanced threat detection



Leave a Reply 2

Your email address will not be published. Required fields are marked *


Riley

Riley

New 300-206 Questions and Answers (2017/9/28) Updated:

QUESTION
Which device can be managed by the Cisco Prime Security Manager?

A. ASA CX
B. ISR G2
C. Nexus
D. UCM

Answer: A
Explanation:

QUESTION
A network engineer must mange and configurations to a cisco networking environment solutions accomplishes this task?

A. cisco IPS manage express and pushing configuration to the ips units
B. cisco security 4.5 or later and pushing configuration bundles to each of the,,,,,
C. cisco adaptive security device manager to push configuration to each of the IPS
D. fire SIGHT manager to bundle and push configuration to the IPS units installed

Answer: D

QUESTION 258
Which two option are main challenges for public cloud data center?

A. deployment cost
B. tenant isolation
C. disaster recovery
D. system scalability
E. network visibility

Answer: BE

QUESTION
A network engineer must manage and push configurations to a Cisco networking environment, in which 10 Cisco ASA with IPS modules reside. Which solution accomplishes this task?

A. Cisco Adaptive Security Device Manager to push configurations to each of the IPS units
B. FireSIGHT manager to bundle and push configurations to the IPS units installed on an SSD within the Cisco ASA 5500 Series ASA
C. Cisco Security Manager 4.5 or later and pushing configuration bundles to each of the IPS units
D. Cisco IPS Manager Express and pushing configurations to the IPS units

Answer: B

QUESTION
When configuring packet-tracer command from CLI, what is the first option that you set?

A. source IP address
B. destination IP address
C. interface
D. protocol (ip, tcp, udp)

Answer: C

QUESTION
What is a benefit the iOS control plane protection?

A. it allows QOS policing of aggregate control-panel
B. it provides for early dropping of packets directed toward closed
C. it prevents the input guide from being overwhelmed by any single
D. it minimizes the number of unprocessed packets a protocol can have

Answer: B

QUESTION
Which two voice and video protocols does the Cisco ASA 5500 Series support with Cisco Unified Communications Application Inspection? (Chose two)

A. SCTP
B. SDP
C. H.323
D. H248
E. SCCP
F. SRTP

Answer: CE
Explanation:

QUESTION
Which two option are protocol and tools are used by management plane when using cisco ASA general management plane hardening ?

A. Unicast Reverse Path Forwarding
B. NetFlow
C. Routing Protocol Authentication
D. Threat detection
E. Syslog
F. ICMP unreachables
G. Cisco URL Filtering

Answer: BE
Explanation:

You can find all new 300-206 Exam Questions PDF Here: http://www.braindump2go.net/?s=300-206