210-250 Exam Questions Answers
Valid4sure 210-250 VCE Practice Test
New Updated 210-250 Exam Questions from
valid4sure 210-250 PDF dumps! Welcome to
download the newest valid4sure 210-250 VCE dumps: (109 Q&As)
- Cisco Cybersecurity Fundamentals certification
Keywords: 210-250
exam dumps, 210-250 exam questions, 210-250 VCE dumps, 210-250 PDF
dumps, 210-250 practice tests, 210-250 study guide, 210-250
braindumps,
210-250 Practice
Test Questions Answers – 210-250 braindump
QUESTION NO: 21
For which reason can HTTPS
traffic make security monitoring difficult?
A. encryption
B. large packet headers
C. Signature detection takes
longer.
D. SSL interception
Answer: D
QUESTION NO: 22
Which network device is used
to separate broadcast domains?
A. router
B. repeater
C. switch
D. bridge
Answer: A
QUESTION NO: 23
Which term describes the act
of a user, without authority or permission, obtaining rights on a system, beyond what were assigned?
A. authentication tunneling
B. administrative abuse
C. rights exploitation
D. privilege escalation
Answer: D
QUESTION NO: 24
Which term represents the
practice of giving employees only those permissions necessary to perform their
specific role within an organization?
A. integrity validation
B. due diligence
C. need to know
D. least privilege
Answer: D
QUESTION NO: 25
Based on which statement does
the discretionary access control security model grant or restrict access ?
A. discretion of the system
administrator
B. security policy defined by
the owner of an object
C. security policy defined by
the system administrator
D. role of a user within an
organization
Answer: B
QUESTION NO: 26
Which event occurs when a
signature-based IDS encounters network traffic that triggers an alert?
A. connection event
B. endpoint event
C. NetFlow event
D. intrusion event
Answer: D
QUESTION NO: 27
One of the objectives of
information security is to protect the CIA of information and systems. What
does CIA mean in this context?
A. Confidentiality, Integrity,
and Availability
B. Confidentiality, Identity,
and Availability
C. Confidentiality, Integrity,
and Authorization
D. Confidentiality, Identity,
and Authorization
Answer: A
QUESTION NO: 28
Which protocol is primarily
supported by the third layer of the Open Systems Interconnection reference
model?
A. HTTP/TLS
B. IPv4/IPv6
C. TCP/UDP
D. ATM/ MPLS
Answer: B
QUESTION NO: 29
Which information security
property is supported by encryption?
A. sustainability
B. integrity
C. confidentiality
D. availability
Answer: C
QUESTION NO: 30
Which two activities are
examples of social engineering? (Choose two)
A. receiving call from the IT
department asking you to verify your username/password to maintain the account
B. receiving an invite to your
department's weekly WebEx meeting
C. sending a verbal request to
an administrator to change the password to the account of a user the
administrator does know
D. receiving an email from MR
requesting that you visit the secure HR website and update your contract
information
E. receiving an unexpected
email from an unknown person with an uncharacteristic attachment from someone
in the same company
Answer: AC
Comments
Post a Comment