Certificate authorities can be deployed in a hierarchical way. Root CAs can delegate their authority to what type of CAs to create and assign identity certificates to clients?
A. Sub-root CAs
B. Subordinate CAs
C. Client CAs
D. Enrollment CAs
Which of the following is true about root certificates?
A. A root certificate contains information about the user.
B. A root certificate contains information about the network security device
C. A root certificate contains the public key of the CA.
D. Root certificates never expire
Which of the following are public key standards?
A. IPsec
B. PKCS #10
C. PKCS #12
D. ISO33012
Which of the following are examples of hashes?
A. ASH-160
B. SHA-1
C. SHA-2
D. MD5
Which of the following are benefits of digital signatures?
A. Authentication
B. Nonrepudiation
C. Encryption
D. Hashing
Which of the following statements are true about public and private key pairs?
A. A key pair is a set of two keys that work in combination with each other as a team.
B. A key pair is a set of two keys that work in isolation.
C. If you use the public key to encrypt data using an asymmetric encryption algorithm, the corresponding private key is used to decrypt the data.
D. If you use the public key to encrypt data using an asymmetric encryption algorithm, the peer decrypts the data with that public key.
Which of the following entities can be found inside of a digital certificate?
A. FQDN
B. DNS server IP address
C. Default gateway
D. Public key
Which of the following are true statements regarding vulnerability scanners and penetration assessments? (Select all that apply.)
A. Vulnerability scanners can crash a device; penetration assessments do not.
B. Vulnerability scanners usually work with known vulnerabilities.
C. Penetration assessment is typically fully automated.
D. Vulnerability scanners can work in active mode and passive mode.
What is an OVAL definition?
A. An XML file that contains information about how to check a system for the presence of vulnerabilities.
B. It is synonymous with the OVAL language
C. An XML file used to represent reporting on the vulnerability assessment.
D. A database schema
Which of the following are examples of common methods used by ciphers?
A. Transposition
B. Substitution
C. Polyalphabetic
D. Polynomial
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.