Leads4pass > Cisco > Cisco Certifications > 210-250 > 210-250 Online Practice Questions and Answers

210-250 Online Practice Questions and Answers

Questions 4

Which IDS system can detect attacks using encryption?

A. Network IDS deployed in inline mode

B. Network IDS deployed in promiscuous mode

C. Host-based IDS

D. Network IPS deployed in inline mode

Buy Now
Questions 5

Which of the following are public key standards?

A. IPsec

B. PKCS #10

C. PKCS #12

D. ISO33012

Buy Now
Questions 6

Which data handling concept pertains to securing artifacts against change?

A. integrity

B. chain of custody

C. risk

D. nonrepudiation

Buy Now
Questions 7

Which description is an example of whaling?

A. when attackers target a group of individuals

B. when attackers use fraudulent websites that look like legitimate ones

C. when attackers target specific individuals

D. when attackers go after the CEO

Buy Now
Questions 8

Which tool is commonly used in a Security Operations Center to aggregate logs sent by endpoint systems, firewalls, intrusion prevention systems, and NetFlow?

A. Cybersecurity Event Management

B. Security Information and Event Management system

C. Firepower Management Center

D. Security Information Management System

Buy Now
Questions 9

What happens when a file hash has never been seen by Cisco's cloud malware analysis system?

A. An unknown disposition status is returned, and the file is automatically submitted to the cloud for dynamic analysis.

B. An unknown disposition status is returned, and the file is automatically stored on the local firewall SSD module.

C. The file is sent directly to Cisco for analysis

D. A CVE is automatically generated for the file, and uploaded to the cloud for dynamic analysis.

E. The file is quietly discarded and the end user is alerted to the presence of malware.

Buy Now
Questions 10

What would be the maximum length of the network mask for a network that has four hosts?

A. /27

B. /30

C. /24

D. /29

Buy Now
Questions 11

Which one of the following options is the routing protocol that is usually used between the major ISPs?

A. BGP

B. OSPF

C. IS-IS

D. EIGRP

E. OSPF or IS-IS

Buy Now
Questions 12

Which directory is commonly used on Linux systems to store log files, including syslog and apache access logs?

A. /etc/log

B. /root/log

C. /lib/log

D. /var/log

Buy Now
Questions 13

Which of the following access control models use security labels to make access decisions?

A. Mandatory access control (MAC)

B. Role-based access control (RBAC)

C. Identity-based access control (IBAC)

D. Discretionary access control (DAC)

Buy Now
Exam Code: 210-250
Exam Name: Cisco Cybersecurity Fundamentals
Last Update: Nov 03, 2022
Questions: 1157
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99