210-250 Premium Bundle

210-250 Premium Bundle

Understanding Cisco Cybersecurity Fundamentals Certification Exam

4.5 
(5175 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Cisco 210-250 Free Practice Questions

Q1. One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?

A. Confidentiality, Integrity, and Availability

B. Confidentiality, Identity, and Availability

C. Confidentiality, Integrity, and Authorization

D. Confidentiality, Identity, and Authorization

Answer: A

Q2. Which cryptographic key is contained in an X.509 certificate?

A. symmetric

B. public

C. private

D. asymmetric

Answer: D

Q3. Which situation indicates application-level white listing?

A. Allow everything and deny specific executable files.

B. Allow specific executable files and deny specific executable files.

C. Writing current application attacks on a whiteboard daily.

D. Allow specific files and deny everything else.

Answer: C

Q4. Which two actions are valid uses of public key infrastructure? (Choose two )

A. ensuring the privacy of a certificate

B. revoking the validation of a certificate

C. validating the authenticity of a certificate

D. creating duplicate copies of a certificate

E. changing ownership of a certificate

Answer: A,C

Q5. Which encryption algorithm is the strongest?

A. AES

B. CES

C. DES

D. 3DES

Answer: A

Q6. Which statement about digitally signing a document is true?

A. The document is hashed and then the document is encrypted with the private key.

B. The document is hashed and then the hash is encrypted with the private key.

C. The document is encrypted and then the document is hashed with the public key

D. The document is hashed and then the document is encrypted with the public key.

Answer: C

Q7. Which definition describes the main purpose of a Security Information and Event Management solution ?

A. a database that collects and categorizes indicators of compromise to evaluate and search for potential security threats

B. a monitoring interface that manages firewall access control lists for duplicate firewall filtering

C. a relay server or device that collects then forwards event logs to another log collection device

D. a security product that collects, normalizes, and correlates event log data to provide holistic views of the security posture

Answer: D

Q8. A firewall requires deep packet inspection to evaluate which layer?

A. application

B. Internet

C. link

D. transport

Answer: A

Q9. Which concern is important when monitoring NTP servers for abnormal levels of traffic?

A. Being the cause of a distributed reflection denial of service attack.

B. Users changing the time settings on their systems.

C. A critical server may not have the correct time synchronized.

D. Watching for rogue devices that have been added to the network.

Answer: C

Q10. Which directory is commonly used on Linux systems to store log files, including syslog and

apache access logs?

A. /etc/log

B. /root/log

C. /lib/log

D. /var/log

Answer: A

Q11. Which term represents the practice of giving employees only those permissions necessary to perform their specific role within an organization?

A. integrity validation

B. due diligence

C. need to know

D. least privilege

Answer: D

Q12. Which network device is used to separate broadcast domains?

A. router

B. repeater

C. switch

D. bridge

Answer: A

Q13. DRAG DROP

Drag the technology on the left to the data type the technology provides on the right.

Answer:

Explanation: Tcpdump = transaction data netflow = session data

Traditional stateful firwall = connection event Web content filtering = full packet capture

Q14. If a web server accepts input from the user and passes it to a bash shell, to which attack method is it vulnerable?

A. input validation

B. hash collision

C. command injection

D. integer overflow

Answer: B

Q15. In NetFlow records, which flags indicate that an HTTP connection was stopped by a security appliance, like a firewall, before it could be built fully?

A. ACK

B. SYN ACK

C. RST

D. PSH, ACK

Answer: B

Q16. Which two features must a next generation firewall include? (Choose two.)

A. data mining

B. host-based antivirus

C. application visibility and control

D. Security Information and Event Management

E. intrusion detection system

Answer: D,E

Q17. A user reports difficulties accessing certain external web pages, When examining traffic to and from the external domain in full packet captures, you notice many SYNs that have the same sequence number, source, and destination IP address, but have different payloads. Which problem is a possible explanation of this situation?

A. insufficient network resources

B. failure of full packet capture solution

C. misconfiguration of web filter

D. TCP injection

Answer: A

Q18. Which two activities are examples of social engineering? (Choose two)

A. receiving call from the IT department asking you to verify your username/password to maintain the account

B. receiving an invite to your department's weekly WebEx meeting

C. sending a verbal request to an administrator to change the password to the account of a user the administrator does know

D. receiving an email from MR requesting that you visit the secure HR website and update your contract information

E. receiving an unexpected email from an unknown person with an uncharacteristic attachment from someone in the same company

Answer: A,D

Q19. Which definition of Windows Registry is true?

A. set of pages that are currently resident m physical memory

B. basic unit to which the operating system allocates processor time

C. set of virtual memory addresses

D. database that stores low-level settings for the operating system

Answer: C

Q20. Which two terms are types of cross site scripting attacks? (Choose two )

A. directed

B. encoded

C. stored

D. reflected

E. cascaded

Answer: C,D

Q21. Which information security property is supported by encryption?

A. sustainability

B. integrity

C. confidentiality

D. availability

Answer: A

Q22. Based on which statement does the discretionary access control security model grant or restrict access ?

A. discretion of the system administrator

B. security policy defined by the owner of an object

C. security policy defined by the system administrator

D. role of a user within an organization

Answer: A

Q23. For which reason can HTTPS traffic make security monitoring difficult?

A. encryption

B. large packet headers

C. Signature detection takes longer.

D. SSL interception

Answer: D

Q24. Which identifier is used to describe the application or process that submitted a log message?

A. action

B. selector

C. priority

D. facility

Answer: D

Q25. Which option is a purpose of port scanning?

A. Identify the Internet Protocol of the target system.

B. Determine if the network is up or down

C. Identify which ports and services are open on the target host.

D. Identify legitimate users of a system.

Answer: A

START 210-250 EXAM