1 / 8

Understanding Cisco Cyber security Fundamentals 210-250 Exam Pass with Guarantee

We are providing Cisco 210-250 real exam questions which helps you to pass your Understanding Cisco Cybersecurity Fundamentals exam in good marks. You can easily prepare your Cisco 210-250 exam with our dumps that are available in both PDF and test engines https://www.troytec.com/exam/210-250-exams

Download Presentation

Understanding Cisco Cyber security Fundamentals 210-250 Exam Pass with Guarantee

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 210-250 Understanding Cisco Cybersecurity Fundamentals Exam : 210-250 Demo Edition © 2018 - 2019Troy Tec, LTD All Rights Reserved 1 http://www.troytec.com

  2. 210-250 QUESTION: 1 Which three fields are within an X.509v3 end entity certificate? (Choose three). A. Private Key associated with the certificate authority B. Digital signature C. Public key associated with the certificate authority D. Public key associated with the subject E. Basic constraints F. Revocation authority for use when the certificate expires Answer: B, D, E QUESTION: 2 Where are configuration records stored? A. In a CMDB B. In a MySQL DB C. In a XLS file D. There is no need to store them Answer: A QUESTION: 3 Which tool provides universal query access to text-based data such as event logs and file system? A. Service viewer B. Log parser C. Windows management instrumentation D. Handles Answer: B QUESTION: 4 Refer to the exhibit. 2 http://www.troytec.com

  3. 210-250 During an analysis this list of email attachments is found. Which files contain the same content? A. 1 and 4 B. 3 and 4 C. 1 and 3 D. 1 and 2 Answer: C QUESTION: 5 Which situation indicates application-level white listing? A. Allow everything and deny specific executable files. B. Allow specific executable files and deny specific executable files. C. Writing current application attacks on a whiteboard daily. D. Allow specific files and deny everything else. Answer: D QUESTION: 6 Which definition of an antivirus program is true? A. program used to detect and remove unwanted malicious software from the system B. program that provides real time analysis of security alerts generated by network hardware and application C. program that scans a running application for vulnerabilities D. rules that allow network traffic to go in and out 3 http://www.troytec.com

  4. 210-250 Answer: A QUESTION: 7 Which of the following is true about heuristic-based algorithms? A. Heuristic-based algorithms may require fine tuning to adapt to network traffic and minimize the possibility of false positives. B. Heuristic-based algorithms do not require fine tuning. C. Heuristic-based algorithms support advanced malware protection. D. Heuristic-based algorithms provide capabilities for the automation of IPS signature creation and tuning. Answer: A QUESTION: 8 As per RFC 1035 which transport layer protocol is used for DNS zone transfer? A. HTTP B. RDP C. UDP D. TCP Answer: D QUESTION: 9 Which evasion method involves performing actions slower than normal to prevent detection? A. traffic fragmentation B. tunneling C. timing attack D. resource exhaustion Answer: C 4 http://www.troytec.com

  5. 210-250 QUESTION: 10 Which protocol is primarily supported by the third layer of the Open Systems Interconnection reference model? A. HTTP/TLS B. IPv4/IPv6 C. TCP/UDP D. ATM/ MPLS Answer: B QUESTION: 11 Company XX must filter/control some application and limited connection based on location across the network, which technology can be used? A. HIDS. B. NGFW. C. Web proxy. D. Load balancers. Answer: B QUESTION: 12 How many broadcast domains are created if three hosts are connected to a Layer 2 switch in full-duplex mode? A. 4 B. 3 C. None D. 1 Answer: D QUESTION: 13 Net flow uses which format? 5 http://www.troytec.com

  6. 210-250 A. base 10 B. ASCII C. Binary D. Hexadecimal Answer: C QUESTION: 14 In which context is it inappropriate to use a hash algorithm? A. Telnet logins B. Verifying file integrity C. SSH logins D. Digital signature verification Answer: A QUESTION: 15 Which NTP service is a best practice to ensure that all network devices are synchronized with a reliable and trusted time source? A. Redundant authenticated NTP B. Redundant unauthenticated NTP C. Authenticated NTP services from one of the local AD domain controllers D. Local NTP within each network device Answer: A QUESTION: 16 DNS query uses which protocol A. TCP B. UDP C. HTTP D. ICMP 6 http://www.troytec.com

  7. 210-250 Answer: B QUESTION: 17 What Does the sum of the risk presented by an application represent for that application ? A. Security violation B. Application Attack Surface C. HIPPA violation D. Vulnerability Answer: B QUESTION: 18 Which two actions are valid uses of public key infrastructure? (Choose two) A. ensuring the privacy of a certificate B. revoking the validation of a certificate C. validating the authenticity of a certificate D. creating duplicate copies of a certificate E. changing ownership of a certificate Answer: A, C QUESTION: 19 Which security monitoring data type is associated with application server logs? A. alert data B. statistical data C. session data D. transaction data Answer: D 7 http://www.troytec.com

  8. 210-250 QUESTION: 20 Which purpose of command and control for network aware malware is true? A. It helps the malware to profile the host B. It takes over the user account C. It contacts a remote server for command and updates D. It controls and down services on the infected host Answer: C 8 http://www.troytec.com

More Related