Which of the following are examples of protocols used for VPN implementations?
A. TCP
B. Secure Sockets Layer (SSL)
C. Multiprotocol Label Switching (MPLS)
D. Internet Protocol Security (IPsec)
Which of the following VPN protocols do not provide data integrity, authentication, and data encryption?
A. L2TP
B. GRE
C. SSL
D. MPLS
VPN implementations are categorized into which of the following two general groups?
A. Encrypted VPNs
B. Non-encrypted VPNs
C. Site-to-site (LAN-to-LAN) VPNs
D. Remote-access VPNs
Which of the following is an example of a remote-access VPN client?
A. Cisco Encrypted Tunnel Client
B. Cisco AnyConnect Secure Mobility Client
C. Cisco ASA Client
D. Cisco Firepower Client
What is a certificate revocation list (CRL)?
A. A list of root certificates of CA servers that can revoke certificates.
B. A list of certificates, based on their serial numbers, that had initially been issued by a CA but have not been revoked and are trusted.
C. A list of certificates, based on their serial numbers, that had initially been issued by a CA but have since been revoked and as a result should not be trusted.
D. A list of serial numbers of CA servers that can participate in a certificate revocation process.
Which of the following is a format for storing both public and private keys using a symmetric password-based key to "unlock" the data whenever the key needs to be used or accessed?
A. PKCS #12
B. PKCS #10
C. PKCS #7
D. PKCS #2
Which of the following is a format of a certificate request sent to a CA that wants to receive its identity certificate? This type of request would include the public key for the entity desiring a certificate.
A. PKCS #1
B. PKCS #7
C. PKCS #10
D. PKCS #12
Which of the following files have the same contents based on their SHA checksum?
bash-3.2$ shasum * b0f8ff8d3c376f802dd615e8a583d4df7306d02b cat.txt 88e513e9186d5f71453115ce8ae3c16057c827d8 chair.txt b0f8ff8d3c376f802dd615e8a583d4df7306d02b chicken.txt 1f95e28fc1aaef50f1987237a73c8b5f1429d375 dog.txt 09bf76d43e9e04ab55884bf01740ea88fa15f4da table.txt
A. cat.txt, dog.txt, and table.txt
B. table.txt and chair.txt
C. chicken.txt and cat.txt
D. chicken.txt and dog.txt
Which of the following statements is true about collision attacks?
A. A collision attack is an attack against databases that causes a collision of data and results in data corruption.
B. A collision attack is a type of denial-of-service (DoS) attack.
C. Collision attacks are a form of web application attack that leverage the collision of data types and data models.
D. A collision attack is an attempt to find two input strings of a hash function that produce the same hash result
Among MD5, SHA-1, and SHA-2, which is the most secure?
A. SHA-1.
B. SHA-2.
C. MD5.
D. They are all equally secure.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.