New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Note! 210-250 has been withdrawn. The new exam code is 200-201

Practice Free 210-250 Understanding Cisco Cybersecurity Fundamentals Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the Cisco 210-250 Exam the most current and reliable questions . To help people study, we've made some of our Understanding Cisco Cybersecurity Fundamentals exam materials available for free to everyone. You can take the Free 210-250 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

which protocol helps to synchronizes and correlate events across multiple network devices:

A.

NTP

B.

time zone

C.

SNMP

D.

CDP

Question # 7

Which Linux terminal command can be used to display all the processes?

A.

ps –ef

B.

ps –u

C.

ps –d

D.

ps –m

Question # 8

Which cryptographic key is contained in an X.509 certificate?

A.

symmetric

B.

public

C.

private

D.

asymmetric

Question # 9

What Does the sum of the risk presented by an application represent for that application ?

A.

Security violation

B.

Application Attack Surface

C.

HIPPA violation

D.

Vulnerability

Question # 10

Which of the following are public key standards?

A.

IPSEC

B.

PKCS #10

C.

PKCS #12

D.

ISO33012

E.

AES

Question # 11

Which access control model does SELinux use?

A.

RBAC

B.

DAC

C.

MAC

D.

ABAC

Question # 12

Which purpose of Command and Control for network aware malware is true?

A.

It helps the malware to profile the host

B.

It controls and shuts down services on the infected host

C.

It takes over the user account

D.

It contacts a remote server for commands and updates

Question # 13

Which of the following are Cisco cloud security solutions?

A.

CloudDLP

B.

OpenDNS

C.

CloudLock

D.

CloudSLS

Question # 14

A system administrator installs an IDS to protect users on 10.2.3.0/24. After the installation, users can see only other machines on their /24 consistently and cannot reach external sites. Which possible explanation is true?

A.

The IDS was configured to fail open and has not yet been fully configured

B.

The IDS was installed inline and is dropping traffic that must be- allowed

C.

The IDS is working properly and providing the users on 10 2 3 0/24 with the security they need

D.

The system administrator mirrored the traffic for that network segment and did not tune the IDS properly

Question # 15

Which of the following are some useful reports you can collect from Cisco ISE related to endpoints? (Select all that apply.)

A.

Web Server Log reports

B.

Top Application reports

C.

RADIUS Authentication reports

D.

Administrator Login reports

Question # 16

Which evasion method involves performing actions slower than normal to prevent detection?

A.

traffic fragmentation

B.

tunneling

C.

timing attack

D.

resource exhaustion

Question # 17

Which two actions are valid uses of public key infrastructure? (Choose two)

A.

ensuring the privacy of a certificate

B.

revoking the validation of a certificate

C.

validating the authenticity of a certificate

D.

creating duplicate copies of a certificate

E.

changing ownership of a certificate

Question # 18

Which utility is the best to block a host portscan?

A.

sandboxing

B.

antimalware

C.

host-based firewall

D.

HIDS

Question # 19

Which technology allows a large number of private IP addresses to be represented by a smaller

number of public IP addresses?

A.

NAT

B.

NTP

C.

RFC 1631

D.

RFC 1918

Question # 20

Which of the following are examples of system-based sandboxing implementations? (Select all that apply.)

A.

Google Project Zero

B.

Google Chromium sandboxing

C.

Java JVM sandboxing

D.

Threat Grid

E.

HTML5 “sandbox” attribute for use with iframes.

Question # 21

At which OSI layer does a router typically operate?

A.

Transport

B.

Network

C.

Data link

D.

Application

Question # 22

Which description is an example of whaling?

A.

When attackers target specific individuals

B.

When attackers target a group of individuals

C.

When attackers go after the CEO

D.

When attackers use fraudulent websites that look like legitimate ones

Question # 23

In NetFlow records, which flags indicate that an HTTP connection was stopped by a security appliance, like a firewall, before it could be built fully?

A.

ACK

B.

SYN ACK

C.

RST

D.

PSH, ACK

Question # 24

Which term represents the chronological record of how evidence was collected- analyzed, preserved, and transferred?

A.

chain of evidence

B.

evidence chronology

C.

chain of custody

D.

record of safekeeping

Question # 25

Which description of a function of a symmetric encryption algorithm is true?

A.

Encrypted data can be shared among various parties without sharing the key

B.

Symmetric encryption algorithms can be used to generate a certificate request to a certificate authority

C.

It uses the same key to encrypt and decrypt data

D.

It uses one way hashing functions to encrypt and decrypt data

Question # 26

A zombie process occurs when which of the following happens?

A.

A process holds its associated memory and resources but is released from the entry table.

B.

A process continues to run on its own.

C.

A process holds on to associate memory but releases resources.

D.

A process releases the associated memory and resources but remains in the entry table.

Question # 27

Which protocol is primarily supported by the third layer of the Open Systems Interconnection reference model?

A.

HTTP/TLS

B.

IPv4/IPv6

C.

TCP/UDP

D.

ATM/ MPLS