Certbus > Cisco > Cisco Certified CyberOps Associate > 210-250 > 210-250 Online Practice Questions and Answers

210-250 Online Practice Questions and Answers

Questions 4

Which access control model uses the function of a subject in an organization?

A. Discretionary access control

B. Attribute-based access control

C. Role-based access control

D. Mandatory access control

Browse 1157 Q&As
Questions 5

Which AAA protocol allows for capabilities exchange?

A. RADIUS

B. TACACS+

C. Diameter

D. Kerberos

Browse 1157 Q&As
Questions 6

In which enterprise patch management model can the system can install a patch automatically?

A. Agentless

B. Passive

C. Agent based

D. Install based

Browse 1157 Q&As
Questions 7

Which of the following statements is true about clientless SSL VPN?

A. The client must use a digital certificate to authenticate.

B. The remote client needs only an SSL-enabled web browser to access resources on the private network of the security appliances.

C. Clientless SSL VPNs do not provide the same level of encryption as client based SSL VPNs.

D. Clientless SSL VPN sessions expire every hour.

Browse 1157 Q&As
Questions 8

Which tool provides universal query access to text-based data such as event logs and file system?

A. log parser

B. Windows Management Instrumentation

C. handles

D. service viewer

Browse 1157 Q&As
Questions 9

Which option is true when using the traffic mirror feature in a switch?

A. Packets are automatically decrypted.

B. Ethernet headers are modified before capture.

C. Packet payloads are lost.

D. Full packet captures are possible.

Browse 1157 Q&As
Questions 10

A system administrator installs an IDS to protect users on 10.2.3.0/24. After the installation, users can see only other machines on their /24 consistently and cannot reach external sites. Which possible explanation is true?

A. The IDS is working properly and providing the users on 10.2.3.0/24 with the security they need

B. The IDS was configured to fail open and has not yet been fully configured

C. The IDS was installed inline and is dropping traffic that must be allowed

D. The system administrator mirrored the traffic for that network segment and did not tune the IDS properly

Browse 1157 Q&As
Questions 11

In Windows Operating System, an application cannot directly access an object data or system resource that an object represents. Which option must the application obtain to examine the object data or system resource?

A. registry

B. ACLs

C. handles

D. WMI

Browse 1157 Q&As
Questions 12

Why would an attacker use Mimikatz once they gained access to a system?

A. to create a tunnel for covert communication channels back to the attacker network

B. to list the user accounts currently logged on to the machine

C. to create a new domain user account to log in to so regular users will not notice their activity

D. to extract passwords and hashes for user accounts that have logged on to the system

Browse 1157 Q&As
Questions 13

Which two statements are true about password hashing? (Choose two.)

A. Hashing produces a fixed-length "fingerprint" of the data that cannot be reversed.

B. Password hashing is becoming less effective as attackers become increasingly proficient at salting.

C. Hashing hides the true password value when passed over the network.

D. Some protocols or applications do not support hashing.

Browse 1157 Q&As
Questions 14

Which two best describe iFrames? (Choose two.)

A. a new Apple product

B. hidden inline frames

C. loading a webpage inside another webpage

D. a frame within a browser where a user can view the page's source code

Browse 1157 Q&As
Questions 15

What are two examples of common database platforms that are used on Linux devices? (Choose two.)

A. MySQL

B. WinSQL

C. SQL-lite

D. NoSQL

Browse 1157 Q&As
Questions 16

What does the chmod 766 command do to a file?

A. changes the file's read/write/execute permissions to a desired configuration B. changes the filename from 766 to whatever value is set in the section

C. It does nothing; it is an illegal command.

D. deletes the file that is identified in the description

Browse 1157 Q&As
Questions 17

To provide origin authentication, the sender encrypts the message using an asymmetric encryption algorithm. In this case, the receiver of the message must use what to decrypt the message?

A. sender's digital signature

B. sender's shared key

C. sender's private key

D. sender's public key

Browse 1157 Q&As
Questions 18

Refer to the exhibit. During an analysis, this list of email attachments is found. Which files contain the same content?

A. 1 and 4

B. 3 and 4

C. 1 and 3

D. 1 and 2

Browse 1157 Q&As
Exam Code: 210-250
Exam Name: Cisco Cybersecurity Fundamentals
Last Update: Nov 03, 2022
Questions: 1157 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99