Exam Code : 1T6-540
Exam Name : Advanced Troubleshooting with InfiniStream Network Mgmt
Vendor Name :
"Network-General"
1T6-540 Dumps
1T6-540 Braindumps 1T6-540 Real Questions 1T6-540 Practice Test
1T6-540 Actual Questions
killexams.com Network-General 1T6-540
Advanced Troubleshooting with InfiniStream Network Mgmt
https://killexams.com/pass4sure/exam-detail/1T6-540
SMTP
Remote Procedure Calls
FTP
HTTP
Which of the following security issues does NOT involve communication with many hosts?
Worm
Peer-to-Peer
Back door
All of the above involve communication with many hosts
Consider the following illustration. It is indicative of:
An abnormally-large file transfer
Interactive commands manually sent to a server
A back door communicating
Possible worm activity
When InfiniStream has Stream data taken from the inside AND outside of a firewall,
.
frames that pass though the firewall will be dropped, because they may have different addressing, due to Network Address Translation. (NAT)
frames that pass though the firewall will be duplicated, but may have different addressing and ports, due to Network Address Translation. (NAT)
frames that pass though the firewall will be removed automatically from the
Stream data
data is always encrypted and can only be reviewed for integrity.
Consider this illustration of a data mining filter. What would it include?
Packets to and from any host except 192.168.1.200 only that use ephemeral ports on the client and server.
Packets to and from host 192.168.1.200 only that use ephemeral ports on the client and server.
Packets to and from host 192.168.1.200 to an HTTP server.
Nothing. No packets would be included.
A sorted list of active ports can help to .
isolate data for further analysis
identify the use of specific applications in the network
locate the most active protocols
all of the above
Remote Procedure Calls may change their listening port number when the service is disabled and restarted.
TRUE
FALSE
The selection of InfiniStream alert protocols is made on the ------------tab.
Syslog
Trap
Bindings
Protocols
The location of the file extracted by the data mining interface (ICE file) is set by
.
ICEConfigParams.cfg
aliases.adr
protocols.reg
the user at startup