Cisco® 210-250 Exam Practice Questions (P. 1)
- Full Access (1130 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
Which definition of a fork in Linux is true?
- Adaemon to execute scheduled commands
- Bparentdirectory name of a file path name
- Cmacros for manipulating CPU sets
- Dnew process created by a parent process
Correct Answer:
D
D
send
light_mode
delete
Question #2
Which identifier is used to describe the application or process that submitted a log message?
- Aaction
- Bselector
- Cpriority
- Dfacility
Correct Answer:
D
Reference:
https://www.tutorialspoint.com/unix/unix-system-logging.htm
D
Reference:
https://www.tutorialspoint.com/unix/unix-system-logging.htm
send
light_mode
delete
Question #3
Which protocol is expected to have a user agent, host, and referrer header in a packet capture?
send
light_mode
delete
Question #4
Which evasion method involves performing actions slower than normal to prevent detection?
- Atraffic fragmentation
- Btunneling
- Ctiming attack
- Dresource exhaustion
Correct Answer:
C
Reference:https://books.google.com/books?id=KIwLSddtAWsC&pg=PA58&lpg=PA58&dq=timing+attack+performing+actions+slower+than+normal+to+prevent
+detection&source=bl&ots=9qu7ywV-mX&sig=_9lwcDDq-
WNaYlEeP7VkR0MPAOE&hl=en&sa=X&ved=0ahUKEwiRwo_P8vvRAhVKyoMKHaUlAUQQ6AEIITAB#v=onepage&q=timing%20attack%20performing%
20actions%20slower%20than%20normal%20to%20prevent%20detection&f=false
C
Reference:https://books.google.com/books?id=KIwLSddtAWsC&pg=PA58&lpg=PA58&dq=timing+attack+performing+actions+slower+than+normal+to+prevent
+detection&source=bl&ots=9qu7ywV-mX&sig=_9lwcDDq-
WNaYlEeP7VkR0MPAOE&hl=en&sa=X&ved=0ahUKEwiRwo_P8vvRAhVKyoMKHaUlAUQQ6AEIITAB#v=onepage&q=timing%20attack%20performing%
20actions%20slower%20than%20normal%20to%20prevent%20detection&f=false
send
light_mode
delete
Question #5
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?
send
light_mode
delete
Question #6
Which definition of permissions in Linux is true?
- Arules that allow network traffic to go in and out
- Btable maintenance program
- Cwritten affidavit that you have to sign before using the system
- Dattributes of ownership and control of an object
Correct Answer:
D
D
send
light_mode
delete
Question #7
Which definition describes the main purpose of a Security Information and Event Management solution?
- Aa database that collects and categorizes indicators of compromise to evaluate and search for potential security threats
- Ba monitoring interface that manages firewall access control lists for duplicate firewall filtering
- Ca relay server or device that collects then forwards event logs to another log collection device
- Da security product that collects, normalizes, and correlates event log data to provide holistic views of the security posture of an environment
Correct Answer:
D
D
send
light_mode
delete
Question #8
If a web server accepts input from the user and passes it to a bash shell, to which attack method if it vulnerable?
- Ainput validation
- Bhash collision
- Ccommand injection
- Dinteger overflow
Correct Answer:
C
C
send
light_mode
delete
Question #9
Which security monitoring data type is associated with application server logs?
send
light_mode
delete
Question #10
Which two terms are types of cross site scripting attacks? (Choose two.)
send
light_mode
delete
All Pages