Proper study guides for Avant-garde Cisco Understanding Cisco Cybersecurity Fundamentals certified begins with Cisco 210-250 preparation products which designed to deliver the 100% Correct 210-250 questions by making you pass the 210-250 test at your first time. Try the free 210-250 demo right now.

2017 Apr 210-250 practice question

Q1. Which option is a purpose of port scanning?

A. Identify the Internet Protocol of the target system.

B. Determine if the network is up or down

C. Identify which ports and services are open on the target host.

D. Identify legitimate users of a system.

Answer: A


Q2. Which term represents the chronological record of how evidence was collected- analyzed, preserved, and transferred?

A. chain of evidence

B. evidence chronology

C. chain of custody

D. record of safekeeping

Answer: C


Q3. Which statement about digitally signing a document is true?

A. The document is hashed and then the document is encrypted with the private key.

B. The document is hashed and then the hash is encrypted with the private key.

C. The document is encrypted and then the document is hashed with the public key

D. The document is hashed and then the document is encrypted with the public key.

Answer: C


Q4. A user reports difficulties accessing certain external web pages, When examining traffic to and from the external domain in full packet captures, you notice many SYNs that have the same sequence number, source, and destination IP address, but have different payloads. Which problem is a possible explanation of this situation?

A. insufficient network resources

B. failure of full packet capture solution

C. misconfiguration of web filter

D. TCP injection

Answer: A


Q5. Which two protocols are used for email (Choose two )

A. NTP

B. DNS

C. HTTP

D. IMAP

E. SMTP

Answer: C,E


Leading 210-250 exam engine:

Q6. Which protocol is primarily supported by the third layer of the Open Systems Interconnection reference model?

A. HTTP/TLS

B. IPv4/IPv6

C. TCP/UDP

D. ATM/ MPLS

Answer: D


Q7. Which term represents a weakness in a system that could lead to the system being compromised?

A. vulnerability

B. threat

C. exploit

D. risk

Answer: A


Q8. Which two actions are valid uses of public key infrastructure? (Choose two )

A. ensuring the privacy of a certificate

B. revoking the validation of a certificate

C. validating the authenticity of a certificate

D. creating duplicate copies of a certificate

E. changing ownership of a certificate

Answer: A,C


Q9. Which security monitoring data type is associated with application server logs?

A. alert data

B. statistical data

C. session data

D. transaction data

Answer: A


Q10. Which cryptographic key is contained in an X.509 certificate?

A. symmetric

B. public

C. private

D. asymmetric

Answer: D