Printable of 210-255 exam engine materials and testing software for Cisco certification for IT specialist, Real Success Guaranteed with Updated 210-255 pdf dumps vce Materials. 100% PASS Implementing Cisco Cybersecurity Operations exam Today!

2017 Mar 210-255 exam price

Q11. Which information must be left out of a final incident report?

A. server hardware configurations

B. exploit or vulnerability used

C. impact and/or the financial loss

D. how the incident was detected

Answer: B


Q12. Which CVSSv3 metric value increases when the attacker is able to modify all files protected by the vulnerable component?

A. confidentiality

B. integrity

C. availability

D. complexity

Answer: A


Q13. Which CVSSv3 metric value increases when attacks consume network bandwidth, processor cycles, or disk space?

A. confidentiality

B. integrity

C. availability

D. complexity

Answer: D


Q14. Which feature is used to find possible vulnerable services running on a server?

A. CPU utilization

B. security policy

C. temporary internet files

D. listening ports

Answer: D


Q15. Refer to the exhibit. You notice that the email volume history has been abnormally high. Which potential result is true?

 

A. Email sent from your domain might be filtered by the recipient.

B. Messages sent to your domain may be queued up until traffic dies down.

C. Several hosts in your network may be compromised.

D. Packets may be dropped due to network congestion.

Answer: C


Renewal 210-255 study guide:

Q16. Which type of analysis assigns values to scenarios to see what the outcome might be in each scenario?

A. deterministic

B. exploratory

C. probabilistic

D. descriptive

Answer: D


Q17. In the context of incident handling phases, which two activities fall under scoping? (Choose two.)

A. determining the number of attackers that are associated with a security incident

B. ascertaining the number and types of vulnerabilities on your network

C. identifying the extent that a security incident is impacting protected resources on the network

D. determining what and how much data may have been affected

E. identifying the attackers that are associated with a security incident

Answer: D,E


Q18. Refer to the Exhibit. A customer reports that they cannot access your organization's website. Which option is a possible reason that the customer cannot access the website?

 

A. The server at 10.33.1.5 is using up too much bandwidth causing a denial- of-service.

B. The server at 10.67.10.5 has a virus.

C. A vulnerability scanner has shown that 10.67.10.5 has been compromised.

D. Web traffic sent from 10.67.10.5 has been identified as malicious by Internet sensors.

Answer: C


Q19. Which CVSSv3 metric value increases when attacks consume network bandwidth, processor cycles, or disk space?

A. confidentiality

B. integrity

C. availability

D. complexity

Answer: D


Q20. What is accomplished in the identification phase of incident handling?

A. determining the responsible user

B. identifying source and destination IP addresses

C. defining the limits of your authority related to a security event

D. determining that a security event has occurred