Which two methods might be used by an analyst to detect SSL/TLS encrypted command-and-control communication? (Choose two.)
A. perform decryption and inspection of SSL/TLS traffic
B. perform firewall HTTP application inspection to detect for the command and control traffic
C. perform IPS HTTP deep packets inspection to detect for the command and control traffic
D. perform analysis of the NetFlow data to detect anomalous TLS/SSL flows
Which protocol or diagnostic tool helps you determine how many hops away a network is and can be exploited by an attacker?
A. SSH
B. traceroute
C. ping
D. TCP
Which part of the UDP header would attackers replace if they change the data payload to prevent the receiver from identifying the change?
A. source port
B. destination port
C. UDP length
D. UDP port
E. UDP checksum
A ping attack that exploits the broadcast IP address in a subnet is referred to as what type of attack?
A. red rat
B. fraggle
C. smurf
D. SYN flood
E. firewalk
Which two attacks can be caused by a rogue DHCP server? (Choose two.)
A. Trojan virus
B. Compromised-Key
C. DoS
D. TCP SYN flood
E. MITM
What type of spoofing attack uses fake source IP addresses that are different than their real IP addresses?
A. MAC spoofing
B. IP spoofing
C. application spoofing
D. name spoofing
What type of attack occurs when an attacker sends a flood of protocol request packets to various IP hosts and the attacker spoofs the source IP address of the packets, such that each packet has the IP address of the intended target rather than the IP address of the attacker as its source address?
A. reflection attack
B. amplification attack
C. MITM attack
D. Trojan virus ARP
What type of attack occurs when the attacker spoofs the IP address of the victim, sending a continuous stream of small requests, which produce a continuous stream of much larger replies that are to be sent to the victim's IP address?
A. reflection attack
B. amplification attack
C. MITM attack
D. Trojan virus
What best describes a DoS attack?
A. attempts to consume all of a critical computer or network resource in order to make it unavailable for valid use
B. poses as legitimate software or email attachment in order to launch a malicious attack when opened
C. can steal data such as user names and passwords without the user realizing that they have been compromised
D. rarely seen because DoS attacks are extremely difficult to engineer and almost impossible to deliver
What best describes an amplification attack?
A. A low volume of bad music is played progressively louder to the point that it becomes unbearable for people to listen to it.
B. A small forged packet elicits a large reply from the reflectors.
C. A small radio signal is initially weak and eventually increases the signal strength so that wireless devices will attach to it instead of the legitimate AP.
D. There is no such attack that is called an amplification attack.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.