You are on page 1of 5

Free4Dump

http://www.free4dump.com
Free demo and valid vce dump for certification exam prep
Instant Download - Best Exam Practice Material - 100% Money Back Guarantee!
IT Certification Guaranteed, The Easy Way!

Exam : 210-250

Title : Understanding Cisco


Cybersecurity Fundamentals

Vendor : Cisco

Version : DEMO

1 from Free4dump.com.
Get Latest & Valid 210-250 Exam's Question and Answers 1
http://www.free4dump.com/210-250-braindumps-torrent.html
Instant Download - Best Exam Practice Material - 100% Money Back Guarantee!
IT Certification Guaranteed, The Easy Way!

NO.1 Which term represents a weakness in a system that could lead to the system being
compromised?
A. vulnerability
B. threat
C. exploit
D. risk
Answer: A

NO.2 In which format are NetFlow records stored?


A. hexadecimal
B. base 10
C. binary
D. ASCII
Answer: C

NO.3 The FMC can share HTML, PDF and CSV data types that relate to a specific event type.
Which event type?
A. host
B. connection
C. intrusion
D. NetFlow
Answer: C

NO.4 Which term represents a potential danger that could take advantage of a weakness in a
system?
A. vulnerability
B. risk
C. threat
D. exploit
Answer: B

NO.5 Which purpose of Command and Control for network aware malware is true?
A. It contacts a remote server for commands and updates.
B. It controls and shuts down services on the infected host.
C. It helps the malware to profile the host
D. It takes over the user account.
Answer: A

NO.6 Which of the following access control models use security labels to make access decisions?
A. Discretionary access control (DAC)
B. Mandatory access control (MAC)
C. Role-based access control (RBAC)
D. Identity-based access control (IBAC)

2 from Free4dump.com.
Get Latest & Valid 210-250 Exam's Question and Answers 2
http://www.free4dump.com/210-250-braindumps-torrent.html
Instant Download - Best Exam Practice Material - 100% Money Back Guarantee!
IT Certification Guaranteed, The Easy Way!

Answer: B

NO.7 Which of the following are Cisco cloud security solutions?


A. CloudDLP
B. OpenDNS
C. CloudLock
D. CloudSLS
Answer: B,C

NO.8 Which action is an attacker taking when they attempt to gain root access on the victim's
system?
A. command injections
B. command and control
C. root kit
D. privilege escalation
Answer: D

NO.9 Stateful and traditional firewalls can analyze packets and judge them against a set of
predetermined rules called access control lists (ACLs). They inspect which of the following elements
within a packet? (Choose Two)
A. Session headers
B. NetFlow flow information
C. Source and destination ports and source and destination IP addresses
D. Protocol information
Answer: C,D

NO.10 Which security principle states that more than one person is required to perform a critical
task?
A. due diligence
B. separation of duties
C. need to know
D. least privilege
Answer: B

NO.11 Which protocol maps IP network addresses to MAC hardware addresses so that IP packets
can be sent across networks?
A. Internet Control Message Protocol
B. Address Resolution Protocol
C. Session Initiation Protocol
D. Transmission Control Protocol/Internet Protocol
Answer: B

NO.12 Which protocol is primarily supported by the third layer of the Open Systems Interconnection

3 from Free4dump.com.
Get Latest & Valid 210-250 Exam's Question and Answers 3
http://www.free4dump.com/210-250-braindumps-torrent.html
Instant Download - Best Exam Practice Material - 100% Money Back Guarantee!
IT Certification Guaranteed, The Easy Way!

reference model?
A. HTTP/TLS
B. IPv4/IPv6
C. TCP/UDP
D. ATM/ MPLS
Answer: B

4 from Free4dump.com.
Get Latest & Valid 210-250 Exam's Question and Answers 4
http://www.free4dump.com/210-250-braindumps-torrent.html

You might also like