Cisco® 210-250 Exam Practice Questions (P. 3)
- Full Access (1130 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
For which reason can HTTPS traffic make security monitoring difficult?
- Aencryption
- Blarge packet headers
- CSignature detection takes longer
- DSSL interception
Correct Answer:
A
A
send
light_mode
delete
Question #22
Which network device is used to separate broadcast domains?
send
light_mode
delete
Question #23
Which term describes the act of a user, without authority or permission, obtaining rights on a system, beyond what were assigned?
- Aauthentication tunneling
- Badministrative abuse
- Crights exploitation
- Dprivilege escalation
Correct Answer:
D
D
send
light_mode
delete
Question #24
Which term represents the practice of giving employees only those permissions necessary to perform their specific role within an organization?
send
light_mode
delete
Question #25
Based on which statement does the discretionary access control security model grant or restrict access?
- Adiscretion of the system administrator
- Bsecurity policy defined by the owner of an object
- Csecurity policy defined by the system administrator
- Drole of a user within an organization
Correct Answer:
B
B
send
light_mode
delete
Question #26
Which event occurs when a signature-based IDS encounters network traffic that triggers an alert?
send
light_mode
delete
Question #27
One of the objectives of information security if to protect the CIA of information and systems. What does CIA mean in this context?
- AConfidentiality, Integrity, and Availability
- BConfidentiality, Identity, and Availability
- CConfidentiality, Integrity, and Authorization
- DConfidentiality, Identity, and Authorization
Correct Answer:
A
A
send
light_mode
delete
Question #28
Which protocol is primarily supported by the third layer of the Open Systems Interconnection reference model?
send
light_mode
delete
Question #29
Which information security property is supported by encryption?
send
light_mode
delete
Question #30
Which two activities are examples of social engineering? (Choose two.)
- Areceiving call from the IT department asking you to verify your username/password to maintain the account
- Breceiving an invite to your department’s weekly WebEx meeting
- Csending a verbal request to an administrator to change the password to the account of a user the administrator does know
- Dreceiving an email from HR requesting that you visit the secure HR website and update your contract information
- Ereceiving an unexpected email from an unknown person with an uncharacteristic attachment from someone in the same company
Correct Answer:
AE
AE
send
light_mode
delete
All Pages