Sie sind auf Seite 1von 5

PASS4TEST

IT Certification Guaranteed, The Easy Way!

http://www.pass4test.com
We offer free update service for one year
Instant Download - Best Exam Practice Material - 100% Money Back Guarantee!
IT Certification Guaranteed, The Easy Way!

Exam : 210-250

Title : Understanding Cisco


Cybersecurity Fundamentals

Vendor : Cisco

Version : DEMO

1 from Pass4test.com.
Get Latest & Valid 210-250 Exam's Question and Answers 1
http://www.pass4test.com/210-250.html
Instant Download - Best Exam Practice Material - 100% Money Back Guarantee!
IT Certification Guaranteed, The Easy Way!

NO.1 You have deployed an enterprise-wide host/endpoint technology for all of the company
corporate PCs.
Management asks you to block a selected set of applications on all corporate PCs.
Which technology is the best option?
A. application whitelisting/blacklisting
B. network NGFW
C. antivirus/antispyware software
D. host-based IDS
Answer: A

NO.2 Which technology allows a large number of private IP addresses to be represented by a smaller
number of public IP addresses?
A. NAT
B. NTP
C. RFC 1631
D. RFC 1918
Answer: A

NO.3 Which process continues to be recorded in the process table after it has ended and the status
is returned to the parent?
A. daemon
B. zombie
C. orphan
D. child
Answer: B

NO.4 How many broadcast domains are created if three hosts are connected to a Layer 2 switch in
full-duplex mode?
A. 4
B. 3
C. None
D. 1
Answer: D

NO.5 In NetFlow records, which flags indicate that an HTTP connection was stopped by a security
appliance, like a firewall, before it could be built fully?
A. ACK
B. SYN ACK
C. RST
D. PSH, ACK
Answer: D

NO.6 Which evasion method involves performing actions slower than normal to prevent detection?

2 from Pass4test.com.
Get Latest & Valid 210-250 Exam's Question and Answers 2
http://www.pass4test.com/210-250.html
Instant Download - Best Exam Practice Material - 100% Money Back Guarantee!
IT Certification Guaranteed, The Easy Way!

A. traffic fragmentation
B. tunneling
C. timing attack
D. resource exhaustion
Answer: C

NO.7 Which term describes the act of a user, without authority or permission, obtaining rights on a
system, beyond what were assigned?
A. authentication tunneling
B. administrative abuse
C. rights exploitation
D. privilege escalation
Answer: D

NO.8 What is one of the advantages of the mandatory access control (MAC) model?
A. Easy and scalable.
B. Stricter control over the information access.
C. The owner can decide whom to grant access to.
Answer: B

NO.9 Which three options are types of Layer 2 network attack? (Choose three.)
A. ARP attacks
B. brute force attacks
C. spoofing attacks
D. DDOS attacks
E. VLAN hopping
F. botnet attacks
Answer: ACE

NO.10 Which definition of the virtual address space for a Windows process is true?
A. actual physical location of an object in memory
B. set of virtual memory addresses that it can use
C. set of pages that are currently resident in physical memory
D. system-level memory protection feature that is built into the operating system
Answer: B

NO.11 Netflow uses which format?


A. base 10
B. ASCII
C. Binary
D. Hexadecimal
Answer: C

3 from Pass4test.com.
Get Latest & Valid 210-250 Exam's Question and Answers 3
http://www.pass4test.com/210-250.html
Instant Download - Best Exam Practice Material - 100% Money Back Guarantee!
IT Certification Guaranteed, The Easy Way!

NO.12 Which situation indicates application-level white listing?


A. Allow everything and deny specific executable files.
B. Allow specific executable files and deny specific executable files.
C. Writing current application attacks on a whiteboard daily.
D. Allow specific files and deny everything else.
Answer: D

4 from Pass4test.com.
Get Latest & Valid 210-250 Exam's Question and Answers 4
http://www.pass4test.com/210-250.html

Das könnte Ihnen auch gefallen