Question 96
Which type of evidence supports a theory or an assumption that results from initial evidence?
Question 97
Which data format is the most efficient to build a baseline of traffic seen over an extended period of time?
Question 98
Which system monitors local system operation and local network access for violations of a security policy?
Question 99
An engineer needs to have visibility on TCP bandwidth usage, response time, and latency, combined with deep packet inspection to identify unknown software by its network traffic flow. Which two features of Cisco Application Visibility and Control should the engineer use to accomplish this goal? (Choose two.)
Question 100
What does an attacker use to determine which network ports are listening on a potential target device?