210-250 Actual Exam Questions

Last updated on Nov. 30, 2024.
Vendor:Cisco
Exam Code:210-250
Exam Name:CCNA Cyber Ops Understanding Cisco Cybersecurity Fundamentals
Exam Questions:1130
 

Topic 1 - Single Topic

Question #1 Topic 1

Which definition of a fork in Linux is true?

  • A. daemon to execute scheduled commands
  • B. parentdirectory name of a file path name
  • C. macros for manipulating CPU sets
  • D. new process created by a parent process
Reveal Solution Hide Solution   Discussion   1

Correct Answer: D 🗳️

Question #2 Topic 1

Which identifier is used to describe the application or process that submitted a log message?

  • A. action
  • B. selector
  • C. priority
  • D. facility
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️
Reference:
https://www.tutorialspoint.com/unix/unix-system-logging.htm

Question #3 Topic 1

Which protocol is expected to have a user agent, host, and referrer header in a packet capture?

  • A. NTP
  • B. HTTP
  • C. DNS
  • D. SSH
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #4 Topic 1

Which evasion method involves performing actions slower than normal to prevent detection?

  • A. traffic fragmentation
  • B. tunneling
  • C. timing attack
  • D. resource exhaustion
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️
Reference:https://books.google.com/books?id=KIwLSddtAWsC&pg=PA58&lpg=PA58&dq=timing+attack+performing+actions+slower+than+normal+to+prevent
+detection&source=bl&ots=9qu7ywV-mX&sig=_9lwcDDq-
WNaYlEeP7VkR0MPAOE&hl=en&sa=X&ved=0ahUKEwiRwo_P8vvRAhVKyoMKHaUlAUQQ6AEIITAB#v=onepage&q=timing%20attack%20performing%
20actions%20slower%20than%20normal%20to%20prevent%20detection&f=false

Question #5 Topic 1

Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?

  • A. replay
  • B. man-in-the-middle
  • C. dictionary
  • D. known-plaintext
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #6 Topic 1

Which definition of permissions in Linux is true?

  • A. rules that allow network traffic to go in and out
  • B. table maintenance program
  • C. written affidavit that you have to sign before using the system
  • D. attributes of ownership and control of an object
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️

Question #7 Topic 1

Which definition describes the main purpose of a Security Information and Event Management solution?

  • A. a database that collects and categorizes indicators of compromise to evaluate and search for potential security threats
  • B. a monitoring interface that manages firewall access control lists for duplicate firewall filtering
  • C. a relay server or device that collects then forwards event logs to another log collection device
  • D. a security product that collects, normalizes, and correlates event log data to provide holistic views of the security posture of an environment
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️

Question #8 Topic 1

If a web server accepts input from the user and passes it to a bash shell, to which attack method if it vulnerable?

  • A. input validation
  • B. hash collision
  • C. command injection
  • D. integer overflow
Reveal Solution Hide Solution   Discussion   1

Correct Answer: C 🗳️

Question #9 Topic 1

Which security monitoring data type is associated with application server logs?

  • A. alert data
  • B. statistical data
  • C. session data
  • D. transaction data
Reveal Solution Hide Solution   Discussion   1

Correct Answer: D 🗳️

Question #10 Topic 1

Which two terms are types of cross site scripting attacks? (Choose two.)

  • A. directed
  • B. encoded
  • C. stored
  • D. reflected
  • E. cascaded
Reveal Solution Hide Solution   Discussion   3

Correct Answer: CD 🗳️

file Viewing page 1 out of 113 pages.
Viewing questions 1-10 out of 1130 questions
Next Questions
Browse atleast 50% to increase passing rate cup
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago