Cisco® 210-250 Exam Practice Questions (P. 2)
- Full Access (1130 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Which two actions are valid uses of public key infrastructure? (Choose two.)
- Aensuring the privacy of a certificate
- Brevoking the validation of a certificate
- Cvalidating the authenticity of a certificate
- Dcreating duplicate copies of a certificate
- Echanging ownership of a certificate
Correct Answer:
BC
BC
send
light_mode
delete
Question #12
Which definition of a process in Windows is true?
- Arunning program
- Bunit of execution that must be manually scheduled by the application
- Cdatabase that stores low-level settings for the OS and for certain applications
- Dbasic unit to which the operating system allocates processor time
Correct Answer:
A
A
send
light_mode
delete
Question #13
Which tool is commonly used by threat actors on a webpage to take advantage of the software vulnerabilities of a system to spread malware?
send
light_mode
delete
Question #14
Which encryption algorithm is the strongest?
send
light_mode
delete
Question #15
In NetFlow records, which flags indicate that an HTTP connection was stopped by a security appliance, like a firewall, before it could be built fully?
send
light_mode
delete
Question #16
Which two tasks can be performed by analyzing the logs of a traditional stateful firewall? (Choose two.)
- AConfirm the timing of network connections differentiated by the TCP 5-tuple.
- BAudit the applications used within a social networking web site.
- CDetermine the user IDs involved in an instant messaging exchange.
- DMap internal private IP addresses to dynamically translated external public IP addresses.
- EIdentify the malware variant carried by an SMTP connection
Correct Answer:
AD
AD
send
light_mode
delete
Question #17
Which term represents a potential danger that could take advantage of a weakness in a system?
send
light_mode
delete
Question #18
An intrusion detection system begins receiving an abnormally high volume of scanning from numerous sources. Which evasion technique does this attempt indicate?
send
light_mode
delete
Question #19
Which term represents the chronological record of how evidence was collected, analyzed, preserved, and transferred?
- Achain of evidence
- Bevidence chronology
- Cchain of custody
- Drecord of safekeeping
Correct Answer:
C
C
send
light_mode
delete
Question #20
In computer security, which information is the term PHI used to describe?
- Aprivate host information
- Bprotected health information
- Cpersonal health information
- Dprotected host information
Correct Answer:
B
B
send
light_mode
delete
All Pages