A Layer 2 redirect or spoofing attack can be referred to as what type of attack?
A. ARP attack
B. DHCP attack
C. NetBios attack
D. SSID attack
Which one of the following options is the illegitimate DHCP server that is referred in context to a DHCP server-based attack?
A. a sitting duck server
B. a rogue DHCP server
C. a target server
D. an erroneous server
Which type of attack forces a machine to respond to a SYN message by sending a packet to itself on the same port it received the SYN?
A. smurf
B. land attack
C. amplification attack
D. reflection attack
Which TCP/IP application protocol can be used in an amplification attack by exploiting the protocol weakness in recursive lookup?
A. HTTPS
B. LDAP
C. HTTP
D. DNS
E. SMTP
What do attackers use to launch an attack on a location without the attack coming directly from the attacker's location?
A. spear phishing
B. malware that is controlled through CnC
C. direct SYN flood attack
D. ping of death
Which three types of traffic do a security analyst need to be aware of, because the traffic might be botnet command and control (CandC) traffic? (Choose three.)
A. P2P
B. DNS
C. SNMP
D. RCMP
E. IRC
F. RTMP
Which two techniques would an attacker utilize in order to have a client send packets to the wrong gateway? (Choose two.)
A. Reflection
B. ICMP redirect
C. DNS spoofing
D. ARP poisoning
Which one of the following options best describes an MITM attack?
A. easily detected and not a threat
B. a system that has the ability to view the communication between two systems and imposes itself in the communication path between those other systems
C. a device that connects to a switch and issues an enormous amount of DHCP requests until the DHCP server runs out of IP addresses
D. a device that issues an extremely large amount of SYN requests to a server, preventing all other devices from making a connection
The type of access attack that allows an attacker to take over a session or spoof a session is done using which technique?
A. brute-force
B. password attack
C. man-in-the-middle
D. malware insertion
Which one of the following types of malware masquerades as a legitimate software, but is actually malicious when launched?
A. brute-force
B. DoS
C. Trojan
D. smurf
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.