Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

To organize hosts into logical arrangements what is important to configure on Cascade Profiler?

A.

Host Baseline Profiles

B.

Custom Port Definitions

C.

Host Groupings

D.

Mitigation Configuration

Which fields are generally available for export using NetFlow technology? (Select 3)

A.

Source and Destination IP Address of endstations

B.

Source and Destination MAC Address of endstations

C.

Source and Destination Hardware Port Numbers of endstations

D.

Source and Destination UDP or TCP Port Numbers

E.

TCP Flags used

How many simultaneous users can access Cascade Profiler?

A.

Ten

B.

Four

C.

Unlimited

D.

Twenty

Which of the following statements are true about NetProfiler Security Profiles? (Choose three.)

A.

A security profile can be created for “business hours” or “weekends” or any other time periods you want to specify.

B.

Security Profiles utilize the SNORT Threat Signature Database.

C.

Security Profile data is aged out after one month.

D.

Security Profiles negate the need for IDS/IPS type systems.

E.

The appliance collects traffic data from the monitored network and aggregate it into security profiles.

F.

Recent statistics play a larger role in the profile than older statistics.

What are the ways Cascade Profiler can graphically depict response times in the GUI?

A.

In Overall Traffic Graphs

B.

In Connection Graphs

C.

In Dashboard Line Graphs

D.

In Overall Traffic Graphs and in Connection Graphs

Fill in the blanks. Using _____ based technology you can query a networking device for statistics such as number of packets and bytes sent out an interface. Using _____ you can export conversation details (including number of bytes and packet per conversation) providing greater granularity into each conversation through a device.

A.

SNMP; Snap-Length

B.

TAP; SNMP

C.

TAP; Syslog

D.

SNMP; NetFlow

E.

Syslog; NetFlow

There are the major characteristics of groups in SteelCentral Portal.

A.

Provide structure in the application model

B.

Manually created

C.

Can be expanded or collapsed

D.

All of the above

Two popular data center projects that network visibility tools can assist with include:

A.

Virtualization and Data Center Mobility

B.

Rationalization and Irrationalization

C.

Virtualization and Data Center Consolidation

D.

Remote Site monitoring and Packet Exportation

E.

Data Import and Data Export

Time control in Cascade Pilot is useful when you: (Select 2)

A.

Know the time span analyzed by the View.

B.

Want to change the time selection covered by the View.

C.

Change the resolution of a strip chart.

D.

Analyze more than one trace file.

Cascade Profiler flow logs can be stored on which of the following?

A.

SAN and Local Disk Storage

B.

SAN only

C.

Local Gateway-Storage

D.

Hard Drive and Ethernet or USB-attached NAS

E.

Local only