Which three describe what happens when a compromised system that is used for malware operation is discovered and taken down? (Choose three.)
A. The malware downloader may be unable to retrieve its payload.
B. The malware may attempt to use a different compromised system to download malicious payload.
C. Malware communication with the CnC server may stop.
D. The malware may inform the CnC center that a compromised system has been discovered and the entire operation should be aborted.
Which two are uses for DNS covert tunnels? (Choose two.)
A. modify data in database
B. stealthy data exfiltration
C. issue CnC traffic to bots on the network
D. DoS attacks
Which two are countermeasures that an administrator should employ to protect against DNS tunneling? (Choose two.)
A. monitor the DNS log for suspicious activities
B. deny all DNS transactions
C. encrypt DNS communications using a hash
D. deploy a solution such as Cisco OpenDNS to block the DNS tunneling traffic
Cisco pxGrid has a unified framework with an open API designed in a hub-andspoke architecture. pxGrid is used to enable the sharing of contextual-based information from which devices?
A. From a Cisco ASA to the Cisco OpenDNS service
B. From a Cisco ASA to the Cisco WSA
C. From a Cisco ASA to the Cisco FMC
D. From a Cisco ISE session directory to other policy network systems, such as Cisco IOS devices and the Cisco ASA
Which of the following describes the use of DMZs?
A. DMZs can be configured in Cisco IPS devices to provide additional inspection capabilities.
B. DMZs can automatically segment the network traffic.
C. DMZs can serve as segments on which a web server farm resides or as extranet connections to business partners.
D. DMZs are only supported in next-generation firewalls.
Which of the following has the most storage requirements?
A. NetFlow
B. Syslog
C. Full packet captures
D. IPS signatures
What is one of the primary benefits of a defense-in-depth strategy?
A. You can deploy advanced malware protection to detect and block advanced persistent threats.
B. You can configure firewall failover in a scalable way.
C. Even if a single control (such as a firewall or IPS) fails, other controls can still protect your environment and assets.
D. You can configure intrusion prevention systems (IPSs) with custom signatures and auto-tuning to be more effective in the network.
What type of password attack is characterized by trying every possible character combination until all combinations have been exhausted?
A. phishing
B. dictionary
C. brute force
D. guessing
Which two statements are true about password hashing? (Choose two.)
A. Hashing produces a fixed-length "fingerprint" of the data that cannot be reversed.
B. Password hashing is becoming less effective as attackers become increasingly proficient at salting.
C. Hashing hides the true password value when passed over the network.
D. Some protocols or applications do not support hashing.
What two are recommended authentication protocols? (Choose two.)
A. NTLMv2
B. cleartext
C. Kerberos
D. NTLMv1
E. none of the above
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.