Exam Details

  • Exam Code
    :210-250
  • Exam Name
    :Cisco Cybersecurity Fundamentals
  • Certification
    :Cisco Certifications
  • Vendor
    :Cisco
  • Total Questions
    :1157 Q&As
  • Last Updated
    :Nov 03, 2022

Cisco Cisco Certifications 210-250 Questions & Answers

  • Question 351:

    A Layer 2 redirect or spoofing attack can be referred to as what type of attack?

    A. ARP attack

    B. DHCP attack

    C. NetBios attack

    D. SSID attack

  • Question 352:

    Which one of the following options is the illegitimate DHCP server that is referred in context to a DHCP server-based attack?

    A. a sitting duck server

    B. a rogue DHCP server

    C. a target server

    D. an erroneous server

  • Question 353:

    Which type of attack forces a machine to respond to a SYN message by sending a packet to itself on the same port it received the SYN?

    A. smurf

    B. land attack

    C. amplification attack

    D. reflection attack

  • Question 354:

    Which TCP/IP application protocol can be used in an amplification attack by exploiting the protocol weakness in recursive lookup?

    A. HTTPS

    B. LDAP

    C. HTTP

    D. DNS

    E. SMTP

  • Question 355:

    What do attackers use to launch an attack on a location without the attack coming directly from the attacker's location?

    A. spear phishing

    B. malware that is controlled through CnC

    C. direct SYN flood attack

    D. ping of death

  • Question 356:

    Which three types of traffic do a security analyst need to be aware of, because the traffic might be botnet command and control (CandC) traffic? (Choose three.)

    A. P2P

    B. DNS

    C. SNMP

    D. RCMP

    E. IRC

    F. RTMP

  • Question 357:

    Which two techniques would an attacker utilize in order to have a client send packets to the wrong gateway? (Choose two.)

    A. Reflection

    B. ICMP redirect

    C. DNS spoofing

    D. ARP poisoning

  • Question 358:

    Which one of the following options best describes an MITM attack?

    A. easily detected and not a threat

    B. a system that has the ability to view the communication between two systems and imposes itself in the communication path between those other systems

    C. a device that connects to a switch and issues an enormous amount of DHCP requests until the DHCP server runs out of IP addresses

    D. a device that issues an extremely large amount of SYN requests to a server, preventing all other devices from making a connection

  • Question 359:

    The type of access attack that allows an attacker to take over a session or spoof a session is done using which technique?

    A. brute-force

    B. password attack

    C. man-in-the-middle

    D. malware insertion

  • Question 360:

    Which one of the following types of malware masquerades as a legitimate software, but is actually malicious when launched?

    A. brute-force

    B. DoS

    C. Trojan

    D. smurf

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.