Exam Details

  • Exam Code
    :210-250
  • Exam Name
    :Cisco Cybersecurity Fundamentals
  • Certification
    :Cisco Certifications
  • Vendor
    :Cisco
  • Total Questions
    :1157 Q&As
  • Last Updated
    :Nov 03, 2022

Cisco Cisco Certifications 210-250 Questions & Answers

  • Question 341:

    Which two are software vulnerability scanners? (Choose two.)

    A. VmStat

    B. Nessus

    C. fingerprint

    D. open VAS

  • Question 342:

    What is an example of a reconnaissance attack tool that will cycle through all well-known ports to provide a complete list of all services that are running on the hosts?

    A. Netuse

    B. ipconfig

    C. NMAP

    D. show run

  • Question 343:

    What best describes an attack surface?

    A. a way to classify which tools were used in an attack

    B. the sum of the different points ("attack vectors") in a given computing device or network that are accessible to an unauthorized user ("attacker")

    C. the people who are involved in protecting the network perimeter

    D. only describes the data that is gathered about an attack

  • Question 344:

    What best describes an attack vector?

    A. the resolution of an attack

    B. a path, method, or route by which an attack was carried out

    C. the result of, or damage from, an attack

    D. the last stage of the attack continuum

  • Question 345:

    What two are examples of UDP-based attacks? (Choose two.)

    A. SYN flood

    B. SQL slammer

    C. UDP flooding

    D. MAC address flooding

  • Question 346:

    What two types of attacks are examples of ICMP DoS attacks? (Choose two.)

    A. smurf attack

    B. blooming onion attack

    C. ping of death attack

    D. DHCP depletion attack

  • Question 347:

    What phase of the TCP communication process is attacked during a TCP SYN flood attack?

    A. three-way handshake

    B. connection established

    C. connection closed

    D. connection reset

  • Question 348:

    What type of IP attack occurs when an attacker inserts itself into a communication session and then takes over the session?

    A. MAC address flooding attack

    B. session hijacking

    C. DHCP depletion attack

    D. DoS attack

  • Question 349:

    Which two of the following statements are true regarding early TCP/IP development? (Choose two.)

    A. TCP/IP was the only network protocol suite available and was developed for internet work environments.

    B. The focus was on solving the technical challenges of moving information quickly and reliably, not to secure it.

    C. The model was developed as a flexible, fault-tolerant set of protocols.

    D. The design and architecture of TCP/IP have not changed since its adoption in the early 1970s.

  • Question 350:

    What is one way of mitigating DHCP attacks by using a Cisco switch?

    A. VLAN segmentation

    B. MAC address security

    C. DHCP snooping

    D. DHCP authentication

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.