Which one of the following utilities allows an attacker to scan the network in stealth mode?
A. Wireshark
B. whois
C. nmap
D. Cain and Abel
E. UDP Unicorn
Which type of common security threat can be solved by patching the operating system or hardware device?
A. phishing
B. SQL injection
C. malware
D. known vulnerabilities
E. weak authentication
Which three of the following options are methods that are used by an attacker while gathering network data? (Choose three.)
A. unplug network devices
B. packet sniffer
C. ping sweeps
D. port scans
Which two of the following might be considered attack surfaces in the network environment? (Choose two.)
A. open ports
B. privacy settings
C. use of SSH
D. use of Telnet
Which TCP flag is used to initiate a graceful termination of a TCP connection?
A. RST
B. FIN
C. ACK
D. SYN
E. URG
F. PSH
Which application- layer protocol that uses UDP to manage and monitor devices on the network could be exploited if it is not secured on devices?
A. TFTP
B. SNMP
C. HTTPS
D. FTP
E. SMTP
Which statement is true about TCP reset attacks?
A. A TCP reset attack is designed to disrupt the TCP 3-way handshake.
B. A TCP reset attack terminates TCP communications between two hosts.
C. An malicious attack is always indicated when the RST bit is set to 1 in a TCP packet header.
D. In a TCP reset attack, the RST bit in the TCP packet header must be set to 1; settings for other fields in the TCP header are irrelevant.
What is one of the main reasons that it is important for security analysts to understand how ICMP works and what normal ICMP activity looks like?
A. Helps them determine when ICMP is broken
B. Enables them to spot misuses of TCP discovery packets and rogue devices
C. Enables them to spot Denial of Service attacks
D. Enables them to spot ARP Poisoning attacks
What information can an attacker use within ICMP to determine what type of OS the device is running?
A. total length
B. TTL value
C. version
D. checksum
What type of IP attack features a simultaneous, coordinated attack from multiple source machines?
A. rogue DHCP attack
B. DDoS attack
C. MITM attack
D. MAC address flooding attack
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.