210-250 Exam - Understanding Cisco Cybersecurity Fundamentals

certleader.com

Q1. Which type of exploit normally requires the culprit to have prior access to the target system?

A. local exploit

B. denial of service

C. system vulnerability

D. remote exploit

Answer: A

Q2. Which cryptographic key is contained in an X.509 certificate?

A. symmetric

B. public

C. private

D. asymmetric

Answer: D

Q3. Which security monitoring data type is associated with application server logs?

A. alert data

B. statistical data

C. session data

D. transaction data

Answer: A

Q4. Which definition of Windows Registry is true?

A. set of pages that are currently resident m physical memory

B. basic unit to which the operating system allocates processor time

C. set of virtual memory addresses

D. database that stores low-level settings for the operating system

Answer: C

Q5. Which two tasks can be performed by analyzing the logs of a traditional stateful firewall? (Choose two.)

A. Confirm the timing of network connections differentiated by the TCP 5-tuple

B. Audit the applications used within a social networking web site.

C. Determine the user IDs involved in an instant messaging exchange.

D. Map internal private IP addresses to dynamically translated external public IP addresses

E. Identify the malware variant carried by ^n SMTP connection

Answer: B,E

Q6. Which encryption algorithm is the strongest?

A. AES

B. CES

C. DES

D. 3DES

Answer: A

Q7. A user reports difficulties accessing certain external web pages, When examining traffic to and from the external domain in full packet captures, you notice many SYNs that have the same sequence number, source, and destination IP address, but have different payloads. Which problem is a possible explanation of this situation?

A. insufficient network resources

B. failure of full packet capture solution

C. misconfiguration of web filter

D. TCP injection

Answer: A

Q8. Which definition of the IIS Log Parser tool is true?

A. a logging module for IIS that allows you to log to a database

B. a data source control to connect to your data source

C. a powerful, versatile tool that makes it possible to run SQL-like queries against log flies

D. a powerful versatile tool that verifies the integrity of the log files

Answer: A

Q9. Which hash algorithm is the weakest?

A. SHA-512

B. RSA 4096

C. SHA-1

D. SHA-256

Answer: D

Q10. Which two activities are examples of social engineering? (Choose two)

A. receiving call from the IT department asking you to verify your username/password to maintain the account

B. receiving an invite to your department's weekly WebEx meeting

C. sending a verbal request to an administrator to change the password to the account of a user the administrator does know

D. receiving an email from MR requesting that you visit the secure HR website and update your contract information

E. receiving an unexpected email from an unknown person with an uncharacteristic attachment from someone in the same company

Answer: A,D