Exam Details

  • Exam Code
    :210-250
  • Exam Name
    :Cisco Cybersecurity Fundamentals
  • Certification
    :Cisco Certifications
  • Vendor
    :Cisco
  • Total Questions
    :1157 Q&As
  • Last Updated
    :Nov 03, 2022

Cisco Cisco Certifications 210-250 Questions & Answers

  • Question 361:

    Which one of the following utilities allows an attacker to scan the network in stealth mode?

    A. Wireshark

    B. whois

    C. nmap

    D. Cain and Abel

    E. UDP Unicorn

  • Question 362:

    Which type of common security threat can be solved by patching the operating system or hardware device?

    A. phishing

    B. SQL injection

    C. malware

    D. known vulnerabilities

    E. weak authentication

  • Question 363:

    Which three of the following options are methods that are used by an attacker while gathering network data? (Choose three.)

    A. unplug network devices

    B. packet sniffer

    C. ping sweeps

    D. port scans

  • Question 364:

    Which two of the following might be considered attack surfaces in the network environment? (Choose two.)

    A. open ports

    B. privacy settings

    C. use of SSH

    D. use of Telnet

  • Question 365:

    Which TCP flag is used to initiate a graceful termination of a TCP connection?

    A. RST

    B. FIN

    C. ACK

    D. SYN

    E. URG

    F. PSH

  • Question 366:

    Which application- layer protocol that uses UDP to manage and monitor devices on the network could be exploited if it is not secured on devices?

    A. TFTP

    B. SNMP

    C. HTTPS

    D. FTP

    E. SMTP

  • Question 367:

    Which statement is true about TCP reset attacks?

    A. A TCP reset attack is designed to disrupt the TCP 3-way handshake.

    B. A TCP reset attack terminates TCP communications between two hosts.

    C. An malicious attack is always indicated when the RST bit is set to 1 in a TCP packet header.

    D. In a TCP reset attack, the RST bit in the TCP packet header must be set to 1; settings for other fields in the TCP header are irrelevant.

  • Question 368:

    What is one of the main reasons that it is important for security analysts to understand how ICMP works and what normal ICMP activity looks like?

    A. Helps them determine when ICMP is broken

    B. Enables them to spot misuses of TCP discovery packets and rogue devices

    C. Enables them to spot Denial of Service attacks

    D. Enables them to spot ARP Poisoning attacks

  • Question 369:

    What information can an attacker use within ICMP to determine what type of OS the device is running?

    A. total length

    B. TTL value

    C. version

    D. checksum

  • Question 370:

    What type of IP attack features a simultaneous, coordinated attack from multiple source machines?

    A. rogue DHCP attack

    B. DDoS attack

    C. MITM attack

    D. MAC address flooding attack

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.