210-250 Exam Questions - Online Test


210-250 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Testking 210-250 Questions are updated and all 210-250 answers are verified by experts. Once you have completely prepared with our 210-250 exam prep kits you will be ready for the real 210-250 exam without a problem. We have Most up-to-date Cisco 210-250 dumps study guide. PASSED 210-250 First attempt! Here What I Did.

Q11. Which two features must a next generation firewall include? (Choose two.)

A. data mining

B. host-based antivirus

C. application visibility and control

D. Security Information and Event Management

E. intrusion detection system

Answer: D,E


Q12. Which type of exploit normally requires the culprit to have prior access to the target system?

A. local exploit

B. denial of service

C. system vulnerability

D. remote exploit

Answer: A


Q13. A firewall requires deep packet inspection to evaluate which layer?

A. application

B. Internet

C. link

D. transport

Answer: A


Q14. Which term represents the practice of giving employees only those permissions necessary to perform their specific role within an organization?

A. integrity validation

B. due diligence

C. need to know

D. least privilege

Answer: D


Q15. Which two protocols are used for email (Choose two )

A. NTP

B. DNS

C. HTTP

D. IMAP

E. SMTP

Answer: C,E


Q16. Which term represents the chronological record of how evidence was collected- analyzed, preserved, and transferred?

A. chain of evidence

B. evidence chronology

C. chain of custody

D. record of safekeeping

Answer: C


Q17. Which definition of the IIS Log Parser tool is true?

A. a logging module for IIS that allows you to log to a database

B. a data source control to connect to your data source

C. a powerful, versatile tool that makes it possible to run SQL-like queries against log flies

D. a powerful versatile tool that verifies the integrity of the log files

Answer: A


Q18. Which two activities are examples of social engineering? (Choose two)

A. receiving call from the IT department asking you to verify your username/password to maintain the account

B. receiving an invite to your department's weekly WebEx meeting

C. sending a verbal request to an administrator to change the password to the account of a user the administrator does know

D. receiving an email from MR requesting that you visit the secure HR website and update your contract information

E. receiving an unexpected email from an unknown person with an uncharacteristic attachment from someone in the same company

Answer: A,D


Q19. Which definition of a process in Windows is true?

A. running program

B. unit of execution that must be manually scheduled by the application

C. database that stores low-level settings for the OS and for certain applications

D. basic unit to which the operating system allocates processor time

Answer: C


Q20. Which two terms are types of cross site scripting attacks? (Choose two )

A. directed

B. encoded

C. stored

D. reflected

E. cascaded

Answer: C,D