Latest 1T6-540 Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : 1T6-540
Exam Name : Advanced Troubleshooting with InfiniStream Network Mgmt
Vendor Name : "Network-General"







1T6-540 Dumps

1T6-540 Braindumps 1T6-540 Real Questions 1T6-540 Practice Test

1T6-540 Actual Questions


killexams.com Network-General 1T6-540


Advanced Troubleshooting with InfiniStream Network Mgmt


https://killexams.com/pass4sure/exam-detail/1T6-540


  1. SMTP

  2. Remote Procedure Calls

  3. FTP

  4. HTTP




Answer: B



Question: 113

Which of the following security issues does NOT involve communication with many hosts?


  1. Worm

  2. Peer-to-Peer

  3. Back door

  4. All of the above involve communication with many hosts




    Answer: C



    Question: 114

    Consider the following illustration. It is indicative of:


    1. An abnormally-large file transfer

    2. Interactive commands manually sent to a server

    3. A back door communicating

    4. Possible worm activity




Answer: D



Question: 115

When InfiniStream has Stream data taken from the inside AND outside of a firewall,

.


  1. frames that pass though the firewall will be dropped, because they may have different addressing, due to Network Address Translation. (NAT)

  2. frames that pass though the firewall will be duplicated, but may have different addressing and ports, due to Network Address Translation. (NAT)

  3. frames that pass though the firewall will be removed automatically from the

    Stream data

  4. data is always encrypted and can only be reviewed for integrity.




Answer: B



Question: 116

Consider this illustration of a data mining filter. What would it include?



  1. Packets to and from any host except 192.168.1.200 only that use ephemeral ports on the client and server.

  2. Packets to and from host 192.168.1.200 only that use ephemeral ports on the client and server.

  3. Packets to and from host 192.168.1.200 to an HTTP server.

  4. Nothing. No packets would be included.




Answer: B



Question: 117

A sorted list of active ports can help to .


  1. isolate data for further analysis

  2. identify the use of specific applications in the network

  3. locate the most active protocols

  4. all of the above




Answer: D



Question: 118

Remote Procedure Calls may change their listening port number when the service is disabled and restarted.


  1. TRUE

  2. FALSE




Answer: A



Question: 119

The selection of InfiniStream alert protocols is made on the ------------tab.


  1. Syslog

  2. Trap

  3. Bindings

  4. Protocols




Answer: C



Question: 120

The location of the file extracted by the data mining interface (ICE file) is set by

.


  1. ICEConfigParams.cfg

  2. aliases.adr

  3. protocols.reg

  4. the user at startup




Answer: A